Unauthorized Data Modification in Getwid – Gutenberg Blocks Plugin for WordPress
CVE-2023-1910

4.3MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
9 June 2023

Summary

The Getwid – Gutenberg Blocks plugin for WordPress is susceptible to unauthorized data modification due to inadequate capability checks in the get_remote_templates function. This vulnerability affects versions up to and including 1.8.3, allowing authenticated users with subscriber-level access or higher to flush the remote template cache. Although cached template information can be accessed through this function, it is publicly available and not deemed sensitive. This creates a risk where attackers could manipulate template cache without sufficient verification.

Affected Version(s)

Getwid – Gutenberg Blocks * <= 1.8.3

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ramuel Gall
.