CVE-2021-24916

Qubely – Advanced Gutenberg Blocks <= 1.8.5 - Insufficient Authorization

mediumIncorrect Authorization
5.3
CVSS Score
5.3
CVSS Score
medium
Severity
1.8.6
Patched in
326d
Time to patch

Description

The Qubely plugin for WordPress is vulnerable to unauthorized arbitrary e-mail sending in versions up to, and including, 1.8.5. This is due to insufficient validation on the presence of a contact form block and validation on the email fields in the qubely_send_form_data() function called via an AJAX action. This makes it possible for unauthenticated attackers to send emails with arbitrary content to arbitrary addresses.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
None
Confidentiality
Low
Integrity
None
Availability

Technical Details

Affected versions<1.8.6
PublishedJuly 17, 2023
Last updatedJune 6, 2024
Affected pluginqubely

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.