Description
The Block Logic – Full Gutenberg Block Display Control plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.8 via the block_logic_check_logic function. This is due to the unsafe evaluation of user-controlled input. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
Published: 2025-03-22
Score: 8.8 High
EPSS: 2.4% Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The Block Logic – Full Gutenberg Block Display Control plugin is vulnerable because the block_logic_check_logic function evaluates user-supplied input with PHP's eval. This flaw is a classic code injection (CWE-94) that allows an attacker with Contributor or higher privileges to run arbitrary PHP code on the WordPress server. The impact is severe, including full compromise of confidentiality, integrity, and availability of the affected site.

Affected Systems

Affected systems are WordPress sites using the Landwire Block Logic – Full Block Display Control plugin, versions up to and including 1.0.8. The vulnerability is present only in these versions; newer releases beyond 1.0.8 are not listed as vulnerable.

Risk and Exploitability

The CVSS score of 8.8 categorizes this issue as high severity. With an EPSS score of 1%, attackers are at a non‑zero but relatively low chance of exploitation, and the vulnerability is not currently listed in the CISA KEV catalog. The attack requires the attacker to be authenticated as a Contributor or higher, which is a realistic scenario for many sites. Once exploited, the attacker can execute arbitrary code, leading to full site compromise.

Generated by OpenCVE AI on April 22, 2026 at 01:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Block Logic plugin to the latest version that removes the eval vulnerability or uninstall the plugin if it is not required
  • If an update is not immediately available, temporarily disable or delete the plugin until a patch can be applied
  • Review and adjust user roles so that Contributors do not have permissions to create or edit Gutenberg blocks, thereby limiting the opportunity to exploit the vulnerability

Generated by OpenCVE AI on April 22, 2026 at 01:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7190 The Block Logic – Full Gutenberg Block Display Control plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.8 via the block_logic_check_logic function. This is due to the unsafe evaluation of user-controlled input. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
References

Tue, 01 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 22 Mar 2025 06:45:00 +0000

Type Values Removed Values Added
Description The Block Logic – Full Gutenberg Block Display Control plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.8 via the block_logic_check_logic function. This is due to the unsafe evaluation of user-controlled input. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
Title Block Logic <= 1.0.8 - Authenticated (Contributor+) Remote Code Execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:50:44.564Z

Reserved: 2025-03-14T10:43:11.949Z

Link: CVE-2025-2303

cve-icon Vulnrichment

Updated: 2025-04-01T16:25:54.816Z

cve-icon NVD

Status : Deferred

Published: 2025-03-22T07:15:24.613

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2303

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T02:00:05Z

Weaknesses