Improper Authorization Vulnerability in VK Blocks Plugin for WordPress
CVE-2023-0584

4.3MEDIUM

Key Information:

Vendor
Wordpress
Status
Vendor
CVE Published:
3 June 2023

Summary

The VK Blocks plugin for WordPress features a vulnerability that allows authenticated users with contributor-level permissions or higher to exploit the REST API's 'update_options' function. This flaw enables these attackers to modify the 'vk_font_awesome_version' setting to any value, which could lead to unintended behavior or further exploitation. Versions up to and including 1.57.0.5 are impacted, making it crucial for administrators to take protective measures.

Affected Version(s)

VK Blocks * <= 1.57.0.5

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ramuel Gall
.