CVE-2021-38314 Scanner

CVE-2021-38314 scanner - Information Disclosure vulnerability in Gutenberg Template Library & Redux Framework plugin for WordPress

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

1 month

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

The Gutenberg Template Library & Redux Framework plugin for WordPress is a popular tool that enables users to develop custom WordPress themes and plugins quickly. It provides an extensive range of pre-built blocks and templates, making it simpler for developers to construct their designs. The plugin offers a simple, drag-and-drop interface that allows users to create complex layouts without coding knowledge. 

Recently, a critical vulnerability was detected in this plugin that allows unauthorized access to sensitive data. The CVE-2021-38314 vulnerability occurs when an attacker exploits a specific AJAX function that is available to unauthenticated users. The attackers can use the AJAX actions to obtain a list of active plugins and their versions, the site's PHP version, and unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY.` 

This vulnerability can lead to severe consequences when exploited, allowing hackers to gain access to the site's sensitive information. With this data, they can launch further attacks, exploit the WordPress core, and create privileged arbitrary files remotely. They can alter the site's content, add malware, and execute other malicious actions on the compromised system.

In conclusion, by subscribing to S4E, individuals can mitigate their digital assets and protect themselves from the latest vulnerabilities. As S4E continuously updates and scans their client's digital assets, users will have access to real-time protection against the latest vulnerabilities and cyber threats. Don't wait until it's too late, subscribe to S4E now for robust protection.

 

REFERENCES

Get started to protecting your Free Full Security Scan