First published: Mon Jan 15 2024(Updated: )
The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Essential Blocks | <4.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6623 has a high severity level due to the risk of Local File Inclusion attacks.
To fix CVE-2023-6623, update the Essential Blocks WordPress plugin to version 4.4.3 or later.
CVE-2023-6623 affects the Essential Blocks WordPress plugin versions prior to 4.4.3.
CVE-2023-6623 can lead to Local File Inclusion attacks when exploited by unauthenticated attackers.
No, CVE-2023-6623 can be exploited by unauthenticated attackers, allowing them to overwrite local variables.