SB2021090309 - Multiple vulnerabilities in Gutenberg Template Library & Redux Framework plugin for WordPress
Published: September 3, 2021 Updated: April 30, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2021-38314)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the "includes" function in "redux-core/class-redux-core.php" file. A remote attacker can gain unauthorized access to sensitive information on the system.
2) Improper Authorization (CVE-ID: CVE-2021-38312)
The vulnerability allows a remote attacker to bypass authotization checks.
The vulnerability exists due to incorrect authorization check in the REST API endpoints registered under the "redux/v1/templates/" REST Route in "redux-templates/classes/class-api.php". A remote authenticated attacker can install arbitrary plugins from the WordPress repository and edit arbitrary posts.
Remediation
Install update from vendor's website.