Impact
The Timeline Block – Beautiful Timeline Builder for WordPress plugin is vulnerable to Insecure Direct Object Reference. The missing validation on the id attribute of the 'timeline_block' shortcode allows an attacker who is logged in with Author level or higher to request private timeline content that was intended for restricted recipients. This results in unauthorized disclosure of private timeline data, a confidentiality breach.
Affected Systems
WordPress sites using the Timeline Block – Beautiful Timeline Builder for WordPress plugin from bplugins. Versions up to and including 1.3.3 are affected. No specific sub‑versions are listed beyond the major release number.
Risk and Exploitability
The vulnerability has a CVSS score of 4.3 and an EPSS probability of less than 1%, indicating a moderate severity but a low likelihood of exploitation. It is not listed in the CISA KEV database. Attackers need only be authenticated with Author level or higher and can leverage the shortcode by supplying an arbitrary id value to obtain private timeline details. The weakness primarily stems from a lack of proper authorization checks (CWE‑639).
OpenCVE Enrichment