CVE-2026-3454
Deferred Deferred - Pending Action
Insecure Direct Object Reference in GenerateBlocks WordPress Plugin

Publication date: 2026-05-05

Last updated on: 2026-05-05

Assigner: Wordfence

Description
The GenerateBlocks plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.0. This is due to missing object-level authorization checks in the /wp-json/generateblocks/v1/dynamic-tag-replacements REST endpoint. The endpoint only verifies that the user has the edit_posts capability but does not verify the user has permission to access the specific post or its associated data referenced by attacker-controlled id parameters in dynamic tag content. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive information from arbitrary posts including author email addresses and non-protected post meta values by crafting dynamic tag payloads such as {{post_meta id:<target>|key:<meta_key>}} and {{post_title id:<target>|link:author_email}}.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-05
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
generateblocks generateblocks to 2.2.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated attackers with Contributor-level access and above to extract sensitive information from arbitrary posts, including author email addresses and non-protected post meta values.

This unauthorized access to sensitive personal data could lead to non-compliance with data protection regulations such as GDPR and HIPAA, which require strict controls on access to personal and sensitive information.

Specifically, the exposure of author email addresses and other personal data without proper authorization checks may violate principles of data minimization and confidentiality mandated by these standards.


Can you explain this vulnerability to me?

The GenerateBlocks plugin for WordPress has a vulnerability called Insecure Direct Object Reference (IDOR) in all versions up to and including 2.2.0. This happens because the plugin's REST endpoint /wp-json/generateblocks/v1/dynamic-tag-replacements only checks if a user has the edit_posts capability but does not verify if the user has permission to access the specific post or data referenced by the attacker-controlled id parameters.

As a result, authenticated users with Contributor-level access or higher can exploit this flaw to extract sensitive information from arbitrary posts. This includes author email addresses and non-protected post meta values by crafting special dynamic tag payloads.


How can this vulnerability impact me? :

This vulnerability allows attackers with Contributor-level access or above to access sensitive information from posts they should not have permission to view. Specifically, they can extract author email addresses and non-protected post meta data from arbitrary posts.

Such unauthorized data disclosure can lead to privacy breaches, targeted phishing attacks, or other malicious activities leveraging the exposed information.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves identifying attempts to exploit the insecure REST endpoint /wp-json/generateblocks/v1/dynamic-tag-replacements by authenticated users with Contributor-level access or higher.

You can monitor your web server logs or use network monitoring tools to look for HTTP requests targeting the vulnerable endpoint with suspicious payloads containing dynamic tag patterns such as {{post_meta id:<target>|key:<meta_key>}} or {{post_title id:<target>|link:author_email}}.

Example commands to detect such activity might include:

  • Using grep on web server access logs to find requests to the vulnerable endpoint: grep "/wp-json/generateblocks/v1/dynamic-tag-replacements" /var/log/apache2/access.log
  • Searching for suspicious dynamic tag payloads in POST data or query parameters: grep -E "\{\{post_meta|\{\{post_title" /var/log/apache2/access.log
  • Using tools like Wireshark or Zeek to monitor HTTP traffic for requests containing these patterns.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Update the GenerateBlocks plugin to a version later than 2.2.0 where the vulnerability is fixed.
  • Restrict access to the /wp-json/generateblocks/v1/dynamic-tag-replacements REST endpoint to trusted users only, or disable the endpoint if not needed.
  • Review and limit user roles and capabilities, ensuring that only trusted users have Contributor-level access or higher.
  • Monitor logs for suspicious activity targeting this endpoint and respond accordingly.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart