The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the get_remote_templates function in versions up to, and including, 1.8.3. This makes it possible for authenticated attackers with subscriber-level permissions or above to flush the remote template cache. Cached template information can also be accessed via this endpoint but these are not considered sensitive as they are publicly accessible from the developer's site.
History

Sat, 21 Dec 2024 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 25 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Motopress getwid
CPEs cpe:2.3:a:motopress:getwid_-_gutenberg_blocks:*:*:*:*:*:wordpress:*:* cpe:2.3:a:motopress:getwid:*:*:*:*:*:wordpress:*:*
Vendors & Products Motopress getwid - Gutenberg Blocks
Motopress getwid

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2023-06-09T05:33:20.298Z

Updated: 2024-12-20T23:42:19.489Z

Reserved: 2023-04-06T13:29:59.935Z

Link: CVE-2023-1910

cve-icon Vulnrichment

Updated: 2024-08-02T06:05:26.765Z

cve-icon NVD

Status : Modified

Published: 2023-06-09T06:15:59.433

Modified: 2024-11-25T16:47:33.943

Link: CVE-2023-1910

cve-icon Redhat

No data.