Impact
The Kadence Blocks – Page Builder Toolkit for Gutenberg Editor plugin for WordPress contains a missing capability check in the AJAX handler that processes image data. The handler verifies only that the user has the capability to edit posts and fails to verify that the user is allowed to upload files. As a result, any authenticated user with Contributor or higher capabilities can trigger the AJAX action to import images from remote URLs into the WordPress Media Library without the standard permission checks. This flaw does not allow direct code execution but permits misuse of the media upload functionality, potentially compromising the integrity of the media repository.
Affected Systems
Kadence Blocks – Page Builder Toolkit for Gutenberg Editor, all released versions up to and including 3.6.1, which are installed on WordPress sites.
Risk and Exploitability
The CVSS score of 4.3 indicates moderate severity, while the EPSS score of less than 1% reflects a low likelihood of exploitation. The vulnerability is not listed in the KEV catalog. Exploitation requires an authenticated account with Contributor or higher capability, so the risk is limited to sites that already have such user roles. Even though no remote code execution or privilege escalation is possible, repeated unauthorized uploads could affect media integrity and availability.
OpenCVE Enrichment