Unauthorized Data Modification in Getwid – Gutenberg Blocks Plugin for WordPress
CVE-2023-1910
4.3MEDIUM
Summary
The Getwid – Gutenberg Blocks plugin for WordPress is susceptible to unauthorized data modification due to inadequate capability checks in the get_remote_templates function. This vulnerability affects versions up to and including 1.8.3, allowing authenticated users with subscriber-level access or higher to flush the remote template cache. Although cached template information can be accessed through this function, it is publicly available and not deemed sensitive. This creates a risk where attackers could manipulate template cache without sufficient verification.
Affected Version(s)
Getwid – Gutenberg Blocks * <= 1.8.3
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Ramuel Gall