SB2021090309 - Multiple vulnerabilities in Gutenberg Template Library & Redux Framework plugin for WordPress



SB2021090309 - Multiple vulnerabilities in Gutenberg Template Library & Redux Framework plugin for WordPress

Published: September 3, 2021 Updated: April 30, 2023

Security Bulletin ID SB2021090309
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2021-38314)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in the "includes" function in "redux-core/class-redux-core.php" file. A remote attacker can gain unauthorized access to sensitive information on the system.


2) Improper Authorization (CVE-ID: CVE-2021-38312)

The vulnerability allows a remote attacker to bypass authotization checks.

The vulnerability exists due to incorrect authorization check in the REST API endpoints registered under the "redux/v1/templates/" REST Route in "redux-templates/classes/class-api.php". A remote authenticated attacker can install arbitrary plugins from the WordPress repository and edit arbitrary posts.


Remediation

Install update from vendor's website.