First published: Fri Jun 09 2023(Updated: )
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the get function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin settings. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpdeveloper Essential Blocks | <=4.0.6 |
https://plugins.trac.wordpress.org/browser/essential-blocks/tags/4.0.6/includes/Admin/Admin.php
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-2084.
The title of this vulnerability is 'The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to ...'.
The severity of CVE-2023-2084 is medium with a severity value of 4.3.
Versions up to, and including, 4.0.6 of the Essential Blocks plugin for WordPress are affected by this vulnerability.
This vulnerability can be exploited by subscriber-level attackers to obtain plugin settings.