First published: Fri Jun 09 2023(Updated: )
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the save function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to save plugin settings. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpdeveloper Essential Blocks | <=4.0.6 |
https://plugins.trac.wordpress.org/browser/essential-blocks/tags/4.0.6/includes/Admin/Admin.php
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-2083.
The title of the vulnerability is 'The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to ...'.
The severity of CVE-2023-2083 is medium with a severity value of 4.3.
CVE-2023-2083 affects the Essential Blocks plugin for WordPress versions up to, and including, 4.0.6.
An attacker with subscriber-level access can exploit CVE-2023-2083 to save plugin settings without proper authorization.