First published: Fri Jun 09 2023(Updated: )
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the template_count function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpdeveloper Essential Blocks | <=4.0.6 |
https://plugins.trac.wordpress.org/browser/essential-blocks/tags/4.0.6/includes/Admin/Admin.php
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-2086 is medium with a CVSS score of 4.3.
CVE-2023-2086 affects the Essential Blocks plugin for WordPress versions up to and including 4.0.6.
CVE-2023-2086 is a vulnerability in the Essential Blocks plugin for WordPress that allows unauthorized use of functionality due to a missing capability check on the template_count function, allowing subscriber-level attackers to obtain plugin template information.
To fix CVE-2023-2086, update the Essential Blocks plugin for WordPress to version 4.0.7 or higher.
You can find more information about CVE-2023-2086 on the official WordPress plugin page and the Wordfence threat intelligence website.