Description
Missing Authorization vulnerability in StellarWP Gutenberg Blocks by Kadence Blocks kadence-blocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through <= 3.3.1.
Published: 2025-01-24
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Kadence Blocks plugin for WordPress contains a missing authorization flaw that permits users to bypass configured access control levels. As a result, attackers who can interact with the plugin's backend or front‑end interfaces may gain access to administrative features, alter content, or perform actions normally restricted to higher‑privileged roles. The vulnerability is categorized as CWE‑862, indicating a flaw in proper enforcement of authorization checks.

Affected Systems

WordPress sites using the StellarWP Gutenberg Blocks by Kadence Blocks plugin version 3.3.1 or earlier are impacted. The plugin is distributed as a WordPress plugin and interacts with standard WordPress roles and capabilities.

Risk and Exploitability

The CVSS score of 4.3 reflects a moderate impact with limited privilege escalation potential. The EPSS score of less than 1% suggests a low probability of automated exploitation at present, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is through the plugin’s administrative views or REST endpoints, where an authenticated or unauthenticated user with sufficient privileges could exploit the missing checks. Based on the description, it is inferred that the vulnerability requires some level of user interaction or existing access to the site’s backend.

Generated by OpenCVE AI on May 1, 2026 at 18:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Kadence Blocks to the latest version that fixes the access‑control issue.
  • Audit any custom role or capability assignments that allow users to edit plugin settings, ensuring only administrators retain those permissions.
  • Restrict access to the plugin's REST endpoints or administrative pages by implementing network or role‑based access controls, and consider disabling the REST API if it is not required for the site’s functionality.

Generated by OpenCVE AI on May 1, 2026 at 18:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3940 Missing Authorization vulnerability in Kadence WP Gutenberg Blocks by Kadence Blocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through 3.3.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Kadence WP Gutenberg Blocks by Kadence Blocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through 3.3.1. Missing Authorization vulnerability in StellarWP Gutenberg Blocks by Kadence Blocks kadence-blocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through <= 3.3.1.
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 12 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 07 Feb 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Kadencewp
Kadencewp gutenberg Blocks With Ai
CPEs cpe:2.3:a:kadencewp:gutenberg_blocks_with_ai:*:*:*:*:*:wordpress:*:*
Vendors & Products Kadencewp
Kadencewp gutenberg Blocks With Ai

Fri, 24 Jan 2025 17:30:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Kadence WP Gutenberg Blocks by Kadence Blocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through 3.3.1.
Title WordPress Kadence Blocks plugin <= 3.3.1 - Broken Access Control vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Kadencewp Gutenberg Blocks With Ai
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:33.898Z

Reserved: 2025-01-23T14:53:08.866Z

Link: CVE-2025-24753

cve-icon Vulnrichment

Updated: 2025-02-12T19:54:26.629Z

cve-icon NVD

Status : Modified

Published: 2025-01-24T18:15:48.950

Modified: 2026-04-23T15:25:26.590

Link: CVE-2025-24753

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T18:30:05Z

Weaknesses