Server Side Request Forgery Vulnerability in Getwid – Gutenberg Blocks for WordPress
CVE-2023-1895

8.5HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
9 June 2023

Summary

The Getwid – Gutenberg Blocks plugin for WordPress contains a Server Side Request Forgery vulnerability in the get_remote_content REST API endpoint. This allows authenticated attackers with subscriber-level permissions or higher to send crafted web requests to arbitrary external locations from within the web application. As a result, attackers could exploit this flaw to access, manipulate, or exfiltrate sensitive information from internal services, posing a significant security risk.

Affected Version(s)

Getwid – Gutenberg Blocks * <= 1.8.3

References

CVSS V3.1

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ramuel Gall
.