Lucene search

K
cveWordfenceCVE-2023-2086
HistoryJun 09, 2023 - 6:16 a.m.

CVE-2023-2086

2023-06-0906:16:03
Wordfence
web.nvd.nist.gov
22
cve-2023-2086
essential blocks
wordpress
security vulnerability
unauthorized use
capability check
nvd

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

4.3

Confidence

High

EPSS

0.001

Percentile

45.8%

The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the template_count function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.

Affected configurations

Nvd
Vulners
Node
wpdeveloperessential_blocksRange4.0.6wordpress
VendorProductVersionCPE
wpdeveloperessential_blocks*cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "wpdevteam",
    "product": "Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "4.0.6",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

4.3

Confidence

High

EPSS

0.001

Percentile

45.8%