Impact
The Gutenberg Essential Blocks plugin uses the eb_save_ai_generated_image function to generate images. This function accepts a URL parameter and forwards the request to a remote host without validating the target. An authenticated user with Author role or higher can invoke this function, permitting the server to send HTTP requests to arbitrary addresses. This behavior can be leveraged to exfiltrate internal data or modify resource state, matching CWE‑918.
Affected Systems
WordPress plugin Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns, versions up to and including 5.7.1 are affected. The vulnerability exists in all releases from the earliest version through 5.7.1.
Risk and Exploitability
The CVSS score is 6.4, indicating a moderate severity. The EPSS score is below 1%, suggesting a low probability of exploitation at this time, and the issue is not listed in the CISA KEV catalog. Attackers need only authenticated Author‑level access, which is typically granted to content contributors. Once the function is called, the plugin can direct the server to any network location, including internal services, making the exploit practical for internal reconnaissance or denial‑of‑service attacks.
OpenCVE Enrichment