CVE-2025-50034
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-20

Last updated on: 2026-04-28

Assigner: Patchstack

Description
Missing Authorization vulnerability in Mahmudul Hasan Arif Enhanced Blocks – Page Builder Blocks for Gutenberg enhanced-blocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Enhanced Blocks – Page Builder Blocks for Gutenberg: from n/a through <= 1.4.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-20
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2025-06-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Missing Authorization (Broken Access Control) issue in the WordPress Enhanced Blocks – Page Builder Blocks for Gutenberg plugin (up to version 1.4.1). It occurs because certain functions lack proper authorization, authentication, or nonce token checks, allowing users with low privileges (Subscriber-level) to perform actions that should be restricted to higher-privileged users. [1]


How can this vulnerability impact me? :

The vulnerability allows unprivileged users to perform unauthorized actions, potentially leading to unauthorized modifications or misuse of the plugin's functionality. Although the CVSS score indicates a low severity impact, exploitation can compromise the integrity of the site. Since the plugin is abandoned and unpatched, the risk remains unless mitigated by removal or virtual patching. Automated attacks may target this vulnerability, so prompt action is advised. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking for unauthorized actions performed by users with Subscriber-level privileges that should be restricted to higher-privileged users. Since the vulnerability arises from missing authorization checks in the plugin, monitoring logs for suspicious activity or unauthorized access attempts related to the Enhanced Blocks – Page Builder Blocks for Gutenberg plugin is recommended. Additionally, professional incident response and server-side malware scanning are advised for compromise detection. No specific commands are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include removing and replacing the vulnerable Enhanced Blocks – Page Builder Blocks for Gutenberg plugin, as no official fix or updated version is available. Deactivating the plugin alone is insufficient unless a virtual patch (vPatch) is applied. Patchstack offers virtual patching that auto-applies security rules to protect sites from exploitation. Prompt action is advised due to the opportunistic nature of automated attacks targeting this vulnerability. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart