First published: Mon Jan 24 2022(Updated: )
The Qubely WordPress plugin before 1.7.8 does not have authorisation and CSRF check on the qubely_delete_saved_block AJAX action, and does not ensure that the block to be deleted belong to the plugin, as a result, any authenticated users, such as subscriber can delete arbitrary posts
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Themeum Qubely | <1.7.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25013 is a vulnerability in the Qubely WordPress plugin before version 1.7.8 that allows authenticated users to delete arbitrary posts.
CVE-2021-25013 has a severity level of medium with a CVSS score of 6.5.
CVE-2021-25013 affects the Qubely WordPress plugin before version 1.7.8 by not having authorization and CSRF checks on a specific AJAX action, allowing authenticated users to delete arbitrary posts.
CVE-2021-25013 affects the Qubely WordPress plugin up to version 1.7.8.
To fix CVE-2021-25013, update the Qubely WordPress plugin to version 1.7.8 or newer.