Files
CVEs-PoC/2021/CVE-2021-25013.md
2025-09-29 21:09:30 +02:00

18 lines
872 B
Markdown

### [CVE-2021-25013](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25013)
![](https://img.shields.io/static/v1?label=Product&message=Qubely%20%E2%80%93%20Advanced%20Gutenberg%20Blocks&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.7.8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brightgreen)
### Description
The Qubely WordPress plugin before 1.7.8 does not have authorisation and CSRF check on the qubely_delete_saved_block AJAX action, and does not ensure that the block to be deleted belong to the plugin, as a result, any authenticated users, such as subscriber can delete arbitrary posts
### POC
#### Reference
- https://wpscan.com/vulnerability/e88b7a70-ee71-439f-b3c6-0300adb980b0
#### Github
- https://github.com/20142995/nuclei-templates