Description
The Kadence Blocks — Page Builder Toolkit for Gutenberg Editor plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 3.5.32. This makes it possible for authenticated attackers, with Contributor-level access and above, to perform an unauthorized action.
Published: 2026-02-17
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation through Missing Authorization
Action: Patch
AI Analysis

Impact

The Kadence Blocks — Page Builder Toolkit for Gutenberg Editor plugin for WordPress is affected by a missing capability check inside a specific function. Authenticated attackers who hold a Contributor role or higher can perform an action that the system should restrict, effectively bypassing intended permission controls. This flaw allows attackers to elevate privileges or execute unintended operations, compromising the integrity of the site’s content and potentially exposing sensitive data.

Affected Systems

WordPress sites using the Kadence Blocks plugin version 3.5.32 or older. The vulnerability applies to all releases up to and including 3.5.32; newer releases beyond 3.5.32 are not affected. The plugin is distributed by StellarWP under the name Kadence Blocks, a toolkit for building Gutenberg blocks.

Risk and Exploitability

The CVSS base score of 4.3 places the flaw in the moderate range, indicating that the attack requires valid credentials and no complex exploitation steps. The EPSS score of less than 1% suggests that exploitation in the wild is unlikely, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is a direct use of the WordPress administrative interface by a user with contributor‑level access or higher; no remote network exploitation is indicated. Because the flaw is purely an authorization omission, an attacker who can authenticate as a contributor can exploit it immediately after login. Assess the exposure of contributor accounts as a priority.

Generated by OpenCVE AI on April 15, 2026 at 20:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Kadence Blocks to version 3.6.0 or later to apply the missing capability check.
  • If an upgrade is not immediately possible, reduce contributor role capabilities or remove contributor access from users who do not need it.
  • Monitor the site for anomalous block creation or modification activity and audit contributor actions after the fix.

Generated by OpenCVE AI on April 15, 2026 at 20:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Stellarwp
Stellarwp kadence Blocks — Page Builder Toolkit For Gutenberg Editor
Wordpress
Wordpress wordpress
Vendors & Products Stellarwp
Stellarwp kadence Blocks — Page Builder Toolkit For Gutenberg Editor
Wordpress
Wordpress wordpress

Tue, 17 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Feb 2026 11:30:00 +0000

Type Values Removed Values Added
Description The Kadence Blocks — Page Builder Toolkit for Gutenberg Editor plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 3.5.32. This makes it possible for authenticated attackers, with Contributor-level access and above, to perform an unauthorized action.
Title Gutenberg Blocks by Kadence Blocks <= 3.5.32 - Missing Authorization
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Stellarwp Kadence Blocks — Page Builder Toolkit For Gutenberg Editor
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:33:30.973Z

Reserved: 2026-02-16T22:23:22.829Z

Link: CVE-2026-2608

cve-icon Vulnrichment

Updated: 2026-02-17T14:28:16.368Z

cve-icon NVD

Status : Deferred

Published: 2026-02-17T12:16:15.600

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2608

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:30:13Z

Weaknesses