First published: Fri Jun 09 2023(Updated: )
The Essential Blocks plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.0.6. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpdeveloper Essential Blocks | <=4.0.6 |
https://plugins.trac.wordpress.org/browser/essential-blocks/tags/4.0.6/includes/Admin/Admin.php
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Essential Blocks plugin in WordPress is CVE-2023-2087.
The severity of CVE-2023-2087 is medium with a severity value of 4.3.
The Essential Blocks plugin for WordPress versions up to and including 4.0.6 are affected by CVE-2023-2087.
The cause of CVE-2023-2087 is missing or incorrect nonce validation on the save function of the Essential Blocks plugin.
Unauthenticated attackers can change plugin settings via forged requests exploiting CVE-2023-2087 in the Essential Blocks plugin for WordPress.