Quote:Two vulnerabilities have been found in the Gutenberg Template Library & Redux Framework plugin for WordPress, which is installed on more than 1 million websites. They could allow arbitrary plugin installation, post deletions and access to potentially sensitive information about a site’s configuration, researchers said.
The plugin, from developer Redux.io, offers various templates and building blocks for creating web pages within WordPress’ Gutenberg editor:
The first bug (CVE-2021-38312) rates 7.1 out of 10 on the CVSS scale, making it high-severity. It arises from the plugin’s use of the WordPress REST API, which processes requests to install and manage the blocks. It fails to authorize user permissions correctly, according to Wordfence.
“While the REST API Endpoints registered under the redux/v1/templates/ REST Route used a permission_callback to verify a user’s permissions, this callback only checked whether or not the user sending the request had the edit_posts capability,” Wordfence researchers noted in a Wednesday posting.
That means that users with lower permissions, such as contributors and authors, could install any plugin in the WordPress repository via the redux/v1/templates/plugin-install endpoint, researchers said, or they could use the redux/v1/templates/delete_saved_block endpoint to erase posts.
The second, medium-severity vulnerability (CVE-2021-38314) rates 5.3 on the CVSS scale. It exists because the Gutenberg Template Library & Redux Framework plugin registers several AJAX actions available to unauthenticated users, one of which is deterministic and predictable, making it possible to uncover what the $support_hash for a site would be.
Read more: Gutenberg Template Library & Redux Framework Bugs Plague WordPress Sites | Threatpost


![[-]](https://www.geeks.fyi/images/collapse.png)

