The GenerateBlocks plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_option_rest' function in all versions up to, and including, 2.1.1. This makes it possible for authenticated attackers, with contributor level access and above, to read arbitrary WordPress options, including sensitive information such as SMTP credentials, API keys, and other data stored by other plugins.
History

Sat, 25 Oct 2025 05:45:00 +0000

Type Values Removed Values Added
Description The GenerateBlocks plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_option_rest' function in all versions up to, and including, 2.1.1. This makes it possible for authenticated attackers, with contributor level access and above, to read arbitrary WordPress options, including sensitive information such as SMTP credentials, API keys, and other data stored by other plugins.
Title GenerateBlocks <= 2.1.1 - Improper Authorization to Authenticated (Contributor+) Arbitrary Options Disclosure
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-10-25T05:31:21.144Z

Updated: 2025-10-25T05:31:21.144Z

Reserved: 2025-10-16T17:39:33.643Z

Link: CVE-2025-11879

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-25T06:15:35.490

Modified: 2025-10-25T06:15:35.490

Link: CVE-2025-11879

cve-icon Redhat

No data.