Unauthorized Functionality Access in Essential Blocks Plugin for WordPress
CVE-2023-2083

4.3MEDIUM

Key Information:

Summary

The Essential Blocks plugin for WordPress has a security vulnerability that allows unauthorized users to alter plugin settings due to a lack of proper functionality checks. Specifically, a capability verification check is missing in the save function for configurations, enabling subscriber-level attackers to carry out changes without the necessary permissions. Although a nonce check is present, it only triggers when a nonce is provided. This oversight allows the nonce verification to be bypassed entirely if a nonce is not included, leading to potential exploitation of the plugin's settings.

Affected Version(s)

Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates * <= 4.0.6

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Marco Wotschka
.