cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forgetwid getwid

Direction: ascending
Jun 07, 2024

Getwid – Gutenberg Blocks # 46ab96992e56b41315f72ca10999a8d0155b4f49

Date
Sep 21, 2021
Research Description
Getwid &#8211; Gutenberg Blocks [getwid] < 1.7.7 WordPress Getwid – Gutenberg Blocks plugin <= 1.7.4 - Authenticated Information Disclosure vulnerability Authenticated Information Disclosure vulnerability discovered in WordPress Getwid – Gutenberg Blocks plugin (versions <= 1.7.4).
Affected versions
Min -, max -.
Status
vulnerable

Getwid &#8211; Gutenberg Blocks # CVE-2023-1895

CVE, Research URL

CVE-2023-1895

Date
Jun 09, 2023
Research Description
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Server Side Request Forgery via the get_remote_content REST API endpoint in versions up to, and including, 1.8.3. This can allow authenticated attackers with subscriber-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Affected versions
Min -, max -.
Status
vulnerable

Getwid &#8211; Gutenberg Blocks # CVE-2023-1910

CVE, Research URL

CVE-2023-1910

Date
Jun 09, 2023
Research Description
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the get_remote_templates function in versions up to, and including, 1.8.3. This makes it possible for authenticated attackers with subscriber-level permissions or above to flush the remote template cache. Cached template information can also be accessed via this endpoint but these are not considered sensitive as they are publicly accessible from the developer's site.
Affected versions
Min -, max -.
Status
vulnerable

Getwid &#8211; Gutenberg Blocks # CVE-2023-6042

CVE, Research URL

CVE-2023-6042

Date
Jan 09, 2024
Research Description
Any unauthenticated user may send e-mail from the site with any title or content to the admin
Affected versions
Min -, max -.
Status
vulnerable

Getwid &#8211; Gutenberg Blocks # CVE-2023-6959

CVE, Research URL

CVE-2023-6959

Date
Feb 06, 2024
Research Description
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the recaptcha_api_key_manage function in all versions up to, and including, 2.0.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to add, modify, or delete the 'Recaptcha Site Key' and 'Recaptcha Secret Key' settings.
Affected versions
Min -, max -.
Status
vulnerable

Getwid &#8211; Gutenberg Blocks # CVE-2023-6963

CVE, Research URL

CVE-2023-6963

Date
Feb 06, 2024
Research Description
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 2.0.4. This makes it possible for unauthenticated attackers to bypass the Captcha Verification of the Contact Form block by omitting 'g-recaptcha-response' from the 'data' array.
Affected versions
Min -, max -.
Status
vulnerable

Getwid &#8211; Gutenberg Blocks # CVE-2024-1948

CVE, Research URL

CVE-2024-1948

Date
Apr 10, 2024
Research Description
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the block content in all versions up to, and including, 2.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable

Getwid &#8211; Gutenberg Blocks # CVE-2024-3588

CVE, Research URL

CVE-2024-3588

Date
May 02, 2024
Research Description
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown block in all versions up to, and including, 2.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable
Jul 21, 2024

Getwid &#8211; Gutenberg Blocks # CVE-2024-6489

CVE, Research URL

CVE-2024-6489

Date
Jul 20, 2024
Research Description
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the get_google_api_key function in all versions up to, and including, 2.0.10. This makes it possible for authenticated attackers, with Contributor-level access and above, to set the MailChimp API key.
Affected versions
Min -, max -.
Status
vulnerable

Getwid &#8211; Gutenberg Blocks # CVE-2024-6491

CVE, Research URL

CVE-2024-6491

Date
Jul 20, 2024
Research Description
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mailchimp_api_key_manage function in all versions up to, and including, 2.0.10. This makes it possible for authenticated attackers, with Contributor-level access and above, to set the MailChimp API key.
Affected versions
Min -, max -.
Status
vulnerable
Nov 21, 2024

Getwid &#8211; Gutenberg Blocks # CVE-2024-10872

CVE, Research URL

CVE-2024-10872

Date
Nov 20, 2024
Research Description
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `template-post-custom-field` block in all versions up to, and including, 2.0.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable
Dec 06, 2024

Getwid &#8211; Gutenberg Blocks # CVE-2024-5020

CVE, Research URL

CVE-2024-5020

Date
Dec 04, 2024
Research Description
Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled FancyBox JavaScript library (versions 1.3.4 to 3.5.7) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable