Impact
Missing authorization in the WordPress Smart Blocks plugin (v1.x up to 2.4) allows an attacker to bypass configured security levels and execute actions that should be restricted. The flaw is a classic broken access control (CWE‑862) that can lead to unauthorized access to data or functions, potentially compromising confidentiality and integrity of the site.
Affected Systems
The vulnerability affects the Smart Blocks plugin from hashthemes, all releases up to and including version 2.4. Sites that have any of these versions installed are impacted.
Risk and Exploitability
The score of 4.3 indicates a low to medium severity, and the EPSS score of less than 1 % signals a very low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Because the flaw resides in a WordPress plugin, it is inferred that the attack vector is web‑based and likely requires an authenticated user or an attacker able to inject requests into the plugin’s endpoints.
OpenCVE Enrichment
EUVD