4.3
CVE-2023-2084
- EPSS 0.11%
- Veröffentlicht 09.06.2023 06:16:02
- Zuletzt bearbeitet 21.11.2024 07:57:54
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Essential Blocks <= 4.0.6 - Missing Authorization via get
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the get function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin settings. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
Mögliche Gegenmaßnahme
Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns: Update to version 4.0.7, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns
Version
* - 4.0.6
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpdeveloper ≫ Essential Blocks SwPlatformwordpress Version <= 4.0.6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.11% | 0.292 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|
| security@wordfence.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|