The Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.7.1 via the eb_save_ai_generated_image function. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Oct 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 20 Oct 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wordpress
Wordpress wordpress Wpdevteam Wpdevteam gutenberg Essential Blocks |
|
Vendors & Products |
Wordpress
Wordpress wordpress Wpdevteam Wpdevteam gutenberg Essential Blocks |
Sat, 18 Oct 2025 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.7.1 via the eb_save_ai_generated_image function. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. | |
Title | Essential Blocks <= 5.7.1 - Authenticated (Author+) Server-Side Request Forgery | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-10-18T04:25:56.613Z
Updated: 2025-10-20T16:29:59.276Z
Reserved: 2025-10-06T09:25:38.394Z
Link: CVE-2025-11361

Updated: 2025-10-20T16:29:55.533Z

Status : Received
Published: 2025-10-18T05:15:33.607
Modified: 2025-10-18T05:15:33.607
Link: CVE-2025-11361

No data.