Impact
The vulnerability resides in an improperly performed authorization check inside the GenerateBlocks plugin for WordPress. A missing capability test on the get_option_rest function allows authenticated users who possess Contributor or higher roles to read any WordPress option value via the REST API. This can expose sensitive data such as SMTP credentials, API keys, and other configuration values stored by WordPress or other plugins. The weakness is classified as CWE-285 (Improper Authorization).
Affected Systems
All instances of the GenerateBlocks WordPress plugin up to and including version 2.1.1 are affected. Any WordPress site that has installed this plugin version is at risk, regardless of theme or other plugins. The issue does not affect newer releases beyond 2.1.1. The impact is limited to sites running the vulnerable plugin version.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity. The EPSS score of less than 1% suggests a very low likelihood that this vulnerability will be actively exploited in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to have a valid WordPress account with Contributor or higher privileges. Once authenticated, the attacker can issue a REST request to the get_option_rest endpoint and retrieve arbitrary option data, including potentially confidential credentials. The lack of a mandatory ability check is the only identified prerequisite for exploitation.
OpenCVE Enrichment