← Volver a CVEs
CVE-2023-6623
CRITICAL9.8
Descripcion
The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado1/15/2024
Ultima modificacion6/11/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
wpdeveloper:essential_blocks
Debilidades (CWE)
CWE-22
Referencias
https://wpscan.com/blog/file-inclusion-vulnerability-fixed-in-essential-blocks-4-4-3/(contact@wpscan.com)
https://wpscan.com/vulnerability/633c28e0-0c9e-4e68-9424-55c32789b41f(contact@wpscan.com)
https://wpscan.com/blog/file-inclusion-vulnerability-fixed-in-essential-blocks-4-4-3/(af854a3a-2127-422b-91ae-364da2661108)
https://wpscan.com/vulnerability/633c28e0-0c9e-4e68-9424-55c32789b41f(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.