Description
The ZoloBlocks – Gutenberg Block Editor Plugin with Advanced Blocks, Dynamic Content, Templates & Patterns plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_popup_status() function in all versions up to, and including, 2.3.11. This makes it possible for unauthenticated attackers to enable/disable popups.
Published: 2025-10-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of pop‑up settings through a missing authorization check
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the update_popup_status() function of the ZoloBlocks WordPress plugin, where a capability check is omitted. As a result, any user who can submit requests to the plugin can toggle pop‑up settings without authentication. This flaw—classified as a missing authorization (CWE‑862)—permits attackers to enable or disable pop‑ups on the site, potentially disrupting user experience and undermining trust in site functionality. While it does not expose private data or allow code execution, the ability to alter site configuration constitutes a significant impact on the integrity of the application.

Affected Systems

All installations of the bdthemes ZoloBlocks Gutenberg Block Editor Plugin for WordPress with a version numbering of 2.3.11 or earlier are affected. The plugin is typically used to add advanced blocks, dynamic content, templates, and patterns to WordPress sites. The flaw is present in all versions up to and including 2.3.11.

Risk and Exploitability

Based on the description, it is inferred that the attack vector is likely unauthenticated over the network, as the missing capability check allows anyone to craft a request to the update_popup_status() endpoint. The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, further implying limited or no documented exploitation. Because no authentication is required, attackers can exploit the flaw without credentials, but the plugin’s web interface must be publicly accessible for the exploit to succeed.

Generated by OpenCVE AI on April 22, 2026 at 00:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the ZoloBlocks plugin to the latest available version, which addresses the missing authorization check for pop‑up status updates.
  • If an update is not possible, restrict unauthenticated access to the update_popup_status() endpoint by adding a capability check or using a role‑based access control plugin.
  • Disable or limit pop‑up functionality for users without the appropriate capabilities, ensuring that only authorized administrators can enable or disable pop‑ups.

Generated by OpenCVE AI on April 22, 2026 at 00:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Bdthemes
Bdthemes zoloblocks
Wordpress
Wordpress wordpress
Vendors & Products Bdthemes
Bdthemes zoloblocks
Wordpress
Wordpress wordpress

Fri, 24 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
Description The ZoloBlocks – Gutenberg Block Editor Plugin with Advanced Blocks, Dynamic Content, Templates & Patterns plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_popup_status() function in all versions up to, and including, 2.3.11. This makes it possible for unauthenticated attackers to enable/disable popups.
Title ZoloBlocks <= 2.3.11 - Missing Authorization to Unauthenticated Popup Enable/Disable
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Bdthemes Zoloblocks
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:27:21.785Z

Reserved: 2025-10-23T20:51:09.503Z

Link: CVE-2025-12134

cve-icon Vulnrichment

Updated: 2025-10-24T12:19:02.516Z

cve-icon NVD

Status : Deferred

Published: 2025-10-24T10:15:38.010

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12134

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:45:04Z

Weaknesses