Unauthorized Functionality Access in Essential Blocks Plugin for WordPress
CVE-2023-2083
4.3MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 9 June 2023
Summary
The Essential Blocks plugin for WordPress has a security vulnerability that allows unauthorized users to alter plugin settings due to a lack of proper functionality checks. Specifically, a capability verification check is missing in the save function for configurations, enabling subscriber-level attackers to carry out changes without the necessary permissions. Although a nonce check is present, it only triggers when a nonce is provided. This oversight allows the nonce verification to be bypassed entirely if a nonce is not included, leading to potential exploitation of the plugin's settings.
Affected Version(s)
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates * <= 4.0.6
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Marco Wotschka