Unauthorized Functionality Access in Essential Blocks Plugin for WordPress
CVE-2023-2084
4.3MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 9 June 2023
Summary
The Essential Blocks plugin for WordPress has a vulnerability that permits unauthorized access to critical plugin settings. This issue arises due to a missing capability check on the get function in all versions up to and including 4.0.6. Although a nonce check exists, it is only enforced when a nonce token is supplied. If no nonce is provided, the verification process is bypassed entirely, exposing sensitive functionalities to subscriber-level attackers. Website administrators should ensure they are using updated versions to mitigate any potential risks.
Affected Version(s)
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates * <= 4.0.6
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Marco Wotschka