Server Side Request Forgery Vulnerability in Getwid – Gutenberg Blocks for WordPress
CVE-2023-1895
8.5HIGH
Summary
The Getwid – Gutenberg Blocks plugin for WordPress contains a Server Side Request Forgery vulnerability in the get_remote_content REST API endpoint. This allows authenticated attackers with subscriber-level permissions or higher to send crafted web requests to arbitrary external locations from within the web application. As a result, attackers could exploit this flaw to access, manipulate, or exfiltrate sensitive information from internal services, posing a significant security risk.
Affected Version(s)
Getwid – Gutenberg Blocks * <= 1.8.3
References
CVSS V3.1
Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Ramuel Gall