Description
WordPress Plugin Essential Blocks-Page Builder Gutenberg Blocks, Patterns & Templates is prone to multiple vulnerabilities that lets remote attackers inject and execute arbitrary code because the application fails to sanitize user-supplied input before being passed to the unserialize() PHP function. Attackers can possibly exploit these issues to execute arbitrary PHP code within the context of the affected webserver process. WordPress Plugin Essential Blocks-Page Builder Gutenberg Blocks, Patterns & Templates version 4.2.0 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 4.2.1 or latest
References
Related Vulnerabilities
Oracle JRE CVE-2023-22025 Vulnerability (CVE-2023-22025)
WordPress Plugin WP-CopyProtect [Protect your blog posts] Cross-Site Scripting (3.0.0)
Jenkins Improper Authentication Vulnerability (CVE-2014-2062)
Mailman Improper Input Validation Vulnerability (CVE-2018-13796)
WordPress 4.8.x Possible SQL Injection Vulnerability (4.8 - 4.8.2)