Impact
The vulnerability is a missing authorization flaw in the GoDaddy CoBlocks WordPress plugin that allows an attacker to bypass the plugin’s configured access control levels. By exploiting this weakness, an attacker could potentially gain unauthorized access to plugin settings or other protected resources within the WordPress site. The weakness aligns with CWE‑862, indicating improper authorization checks.
Affected Systems
The affected system is the GoDaddy CoBlocks plugin for WordPress. All releases up to and including version 3.1.13 are vulnerable. No other vendors or products are listed as impacted.
Risk and Exploitability
The CVSS score of 4.3 indicates moderate severity, while the EPSS score of less than 1% shows that the likelihood of exploitation is very low at present. The vulnerability is not listed in the CISA KEV catalog, and no official workaround or patch is mentioned at this time. The attack vector is not explicitly stated; however, it is inferred that an attacker could exploit the issue remotely through the web interface using an unauthorized or low‑privilege account, or potentially via an authenticated user with insufficient permissions. The impact would remain confined to the defective access controls within the plugin and would not provide direct code execution capability.
OpenCVE Enrichment
EUVD