CVE-2021-38312

HIGH

Gutenberg Template Library & Redux Framework <= 4.2.11 - Auth Bypass

Title source: llm
STIX 2.1

Description

The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress used an incorrect authorization check in the REST API endpoints registered under the “redux/v1/templates/” REST Route in “redux-templates/classes/class-api.php”. The `permissions_callback` used in this file only checked for the `edit_posts` capability which is granted to lower-privileged users such as contributors, allowing such users to install arbitrary plugins from the WordPress repository and edit arbitrary posts.

Scores

CVSS v3 7.1
EPSS 0.0014
EPSS Percentile 33.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-280 CWE-863
Status published
Products (1)
redux/gutenberg_template_library_\&_redux_framework < 4.2.11
Published Sep 02, 2021
Tracked Since Feb 18, 2026