Gutenberg Blocks by Kadence Blocks Vulnerability – Page Builder Features – Authenticated(Contributor+) Server-Side Request Forgery (SSRF) – CVE-2023-6964 | WordPress Plugin Vulnerability Report
Plugin Name: Gutenberg Blocks by Kadence Blocks – Page Builder Features
Key Information:
- Software Type: Plugin
- Software Slug: kadence-blocks
- Software Status: Active
- Software Author: britner
- Software Downloads: 18,430,842
- Active Installs: 400,000
- Last Updated: April 16, 2024
- Patched Versions: 3.2.12
- Affected Versions: <= 3.1.26
Vulnerability Details:
- Name: Gutenberg Blocks by Kadence Blocks – Page Builder Features <= 3.1.26
- Title: Authenticated(Contributor+) Server-Side Request Forgery (SSRF)
- Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
- CVE: CVE-2023-6964
- CVSS Score: 8.5
- Publicly Published: April 9, 2024
- Researcher: Lucio Sá
- Description: The Gutenberg Blocks by Kadence Blocks – Page Builder Features plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.1.26 via the 'kadence_import_get_new_connection_data' AJAX action. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Summary:
The Gutenberg Blocks by Kadence Blocks – Page Builder Features plugin for WordPress has a vulnerability in versions up to and including 3.1.26 that allows authenticated users with at least contributor rights to exploit Server-Side Request Forgery (SSRF). This vulnerability has been patched in version 3.2.12.
Detailed Overview:
The vulnerability in the Gutenberg Blocks by Kadence Blocks plugin allows attackers who have contributor-level access to send web requests to internal and external locations, which could be used to access or modify information unlawfully. The issue was identified by researcher Lucio Sá and concerns the 'kadence_import_get_new_connection_data' AJAX action. The risk involves the possibility of exposing sensitive data or affecting web application operations. Remediation was swiftly implemented by the developers in the patch release of version 3.2.12.
Advice for Users:
- Immediate Action: Users are encouraged to update to the patched version 3.2.12 immediately.
- Check for Signs of Vulnerability: Monitor access logs for unusual web requests that could indicate exploitation of this vulnerability.
- Alternate Plugins: While a patch is available, users might still consider plugins that offer similar functionality as a precaution.
- Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities.
Conclusion:
The prompt response from the developers of the Gutenberg Blocks by Kadence Blocks plugin to patch this vulnerability underscores the importance of timely updates. Users are advised to ensure that they are running version 3.2.12 or later to secure their WordPress installations.
References:
Detailed Report:
In the fast-paced world of technology, one small oversight can open the door to significant security risks. The recent discovery of a critical vulnerability in the widely-used WordPress plugin, "Gutenberg Blocks by Kadence Blocks – Page Builder Features," serves as a stark reminder of this fact. Known as CVE-2023-6964, this security flaw highlights the ongoing challenges website owners face in maintaining the integrity and safety of their digital platforms.
About the Plugin:
"Gutenberg Blocks by Kadence Blocks – Page Builder Features" is a popular plugin designed to enhance the functionality of WordPress sites with advanced page builder features. As of April 2024, the plugin boasts over 400,000 active installs and has been downloaded more than 18 million times. Despite its popularity and utility, the plugin became a target for exploitation due to a Server-Side Request Forgery (SSRF) vulnerability affecting all versions up to and including 3.1.26.
Details of the Vulnerability:
This SSRF vulnerability allows authenticated users, specifically those with contributor-level access or higher, to send unauthorized web requests from the server. Identified by researcher Lucio Sá and publicly disclosed on April 9, 2024, this vulnerability could enable attackers to access or alter internal services and sensitive data, which could have devastating consequences for business operations and user privacy. The issue exists in the plugin's 'kadence_import_get_new_connection_data' AJAX action and has a high severity rating with a CVSS score of 8.5.
Previous Incidents:
It's worth noting that this isn't the first time vulnerabilities have been reported in this plugin. Since August 2023, there have been seven other reported issues, underscoring the necessity for continuous monitoring and updates.
Remediation Steps:
Upon discovery, the plugin developers acted swiftly to address the issue, releasing a patched version (3.2.12) that resolves the vulnerability. Users of the plugin are urged to update to this latest version immediately to protect their sites. Additionally, it is advisable to regularly check access logs for any unusual activity that could suggest an exploitation of this flaw.
Advice for Small Business Owners:
For small business owners, the reality of managing a website can be daunting, especially with limited time and resources to dedicate to cybersecurity. However, the security of your website should never be sidelined. Regularly updating your plugins, themes, and core WordPress installation is crucial. Consider setting up automatic updates where possible and subscribing to security blogs or services that can alert you to new vulnerabilities in plugins you use.
Conclusion:
The proactive response from the developers of the Gutenberg Blocks by Kadence Blocks plugin demonstrates the critical importance of timely updates in mitigating security risks. As a business owner, keeping your website's software up to date is one of the most effective ways to protect against vulnerabilities. Remember, cybersecurity is not just about protecting data—it's about safeguarding your business reputation and the trust of your customers.
Staying Secure
Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.
Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.
Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.