← Retour aux CVEs
CVE-2023-6623
CRITICAL9.8
Description
The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie1/15/2024
Derniere modification6/11/2025
Sourcenvd
Observations honeypot0
Produits affectes
wpdeveloper:essential_blocks
Faiblesses (CWE)
CWE-22
References
https://wpscan.com/blog/file-inclusion-vulnerability-fixed-in-essential-blocks-4-4-3/(contact@wpscan.com)
https://wpscan.com/vulnerability/633c28e0-0c9e-4e68-9424-55c32789b41f(contact@wpscan.com)
https://wpscan.com/blog/file-inclusion-vulnerability-fixed-in-essential-blocks-4-4-3/(af854a3a-2127-422b-91ae-364da2661108)
https://wpscan.com/vulnerability/633c28e0-0c9e-4e68-9424-55c32789b41f(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.