A PHP Object Injection vulnerability has been identified in the WordPress Essential Blocks for Gutenberg Plugin. This vulnerability could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.
This vulnerability was discovered and responsibly reported by Marco Wotschka.
The vulnerability is a PHP Object Injection vulnerability that occurs in the essential-blocks.php file. The vulnerability allows an attacker to exploit a flaw in the way that the plugin handles user input to inject malicious PHP objects into the website.
Severity:
The vulnerability has a CVSS 3.1 score of 8.3, which is considered to be high. This means that the vulnerability is likely to be exploited and could have a significant impact on the affected system.
Affected Versions:
To effectively mitigate this vulnerability, it’s imperative to update the Essential Blocks for Gutenberg Plugin to the latest available version, which should be at least 4.2.1.
Impact:
An attacker who successfully exploits this vulnerability could:
- Execute arbitrary PHP code on the affected website.
- Inject malicious SQL code into the website’s database.
- Perform path traversal attacks to access sensitive files on the website.
- Cause the website to become unavailable.
Recommendation:
Users of the Essential Blocks for Gutenberg Plugin are strongly advised to update to the latest available version (at least 4.2.1). This vulnerability has been fixed in version 4.2.1.