First published: Fri Jun 09 2023(Updated: )
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the templates function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpdeveloper Essential Blocks | <=4.0.6 |
https://plugins.trac.wordpress.org/browser/essential-blocks/tags/4.0.6/includes/Admin/Admin.php
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2085 is a vulnerability found in the Essential Blocks plugin for WordPress.
CVE-2023-2085 has a severity rating of medium, with a score of 4.3.
CVE-2023-2085 allows subscriber-level attackers to obtain plugin template information.
The affected version of the Essential Blocks plugin for WordPress is up to, and including, version 4.0.6.
Yes, please refer to the official references for fixes and patches for CVE-2023-2085.