### [CVE-2021-25013](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25013) ![](https://img.shields.io/static/v1?label=Product&message=Qubely%20%E2%80%93%20Advanced%20Gutenberg%20Blocks&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.7.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brightgreen) ### Description The Qubely WordPress plugin before 1.7.8 does not have authorisation and CSRF check on the qubely_delete_saved_block AJAX action, and does not ensure that the block to be deleted belong to the plugin, as a result, any authenticated users, such as subscriber can delete arbitrary posts ### POC #### Reference - https://wpscan.com/vulnerability/e88b7a70-ee71-439f-b3c6-0300adb980b0 #### Github - https://github.com/20142995/nuclei-templates