The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Server Side Request Forgery via the get_remote_content REST API endpoint in versions up to, and including, 1.8.3. This can allow authenticated attackers with subscriber-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
History

Tue, 03 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 25 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Motopress getwid
CPEs cpe:2.3:a:motopress:getwid_-_gutenberg_blocks:*:*:*:*:*:wordpress:*:* cpe:2.3:a:motopress:getwid:*:*:*:*:*:wordpress:*:*
Vendors & Products Motopress getwid - Gutenberg Blocks
Motopress getwid

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2023-06-09T05:33:38.329Z

Updated: 2024-12-03T16:37:42.850Z

Reserved: 2023-04-05T19:47:25.037Z

Link: CVE-2023-1895

cve-icon Vulnrichment

Updated: 2024-08-02T06:05:26.804Z

cve-icon NVD

Status : Modified

Published: 2023-06-09T06:15:58.997

Modified: 2024-11-25T16:47:33.943

Link: CVE-2023-1895

cve-icon Redhat

No data.