Vulnerability Details CVE-2021-25013
The Qubely WordPress plugin before 1.7.8 does not have authorisation and CSRF check on the qubely_delete_saved_block AJAX action, and does not ensure that the block to be deleted belong to the plugin, as a result, any authenticated users, such as subscriber can delete arbitrary posts
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 35.1%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 4.0
Products affected by CVE-2021-25013
-
cpe:2.3:a:themeum:qubely:-
-
cpe:2.3:a:themeum:qubely:1.2.8
-
cpe:2.3:a:themeum:qubely:1.2.9
-
cpe:2.3:a:themeum:qubely:1.3.0
-
cpe:2.3:a:themeum:qubely:1.3.1
-
cpe:2.3:a:themeum:qubely:1.3.2
-
cpe:2.3:a:themeum:qubely:1.3.3
-
cpe:2.3:a:themeum:qubely:1.3.4
-
cpe:2.3:a:themeum:qubely:1.3.5
-
cpe:2.3:a:themeum:qubely:1.3.6
-
cpe:2.3:a:themeum:qubely:1.3.7
-
cpe:2.3:a:themeum:qubely:1.3.8
-
cpe:2.3:a:themeum:qubely:1.3.9
-
cpe:2.3:a:themeum:qubely:1.3.91
-
cpe:2.3:a:themeum:qubely:1.4.0
-
cpe:2.3:a:themeum:qubely:1.4.1
-
cpe:2.3:a:themeum:qubely:1.5.0
-
cpe:2.3:a:themeum:qubely:1.5.1
-
cpe:2.3:a:themeum:qubely:1.5.2
-
cpe:2.3:a:themeum:qubely:1.5.3
-
cpe:2.3:a:themeum:qubely:1.5.4
-
cpe:2.3:a:themeum:qubely:1.5.5
-
cpe:2.3:a:themeum:qubely:1.6.0
-
cpe:2.3:a:themeum:qubely:1.6.1
-
cpe:2.3:a:themeum:qubely:1.6.2
-
cpe:2.3:a:themeum:qubely:1.6.3
-
cpe:2.3:a:themeum:qubely:1.6.4
-
cpe:2.3:a:themeum:qubely:1.6.5
-
cpe:2.3:a:themeum:qubely:1.6.6
-
cpe:2.3:a:themeum:qubely:1.6.7
-
cpe:2.3:a:themeum:qubely:1.6.8
-
cpe:2.3:a:themeum:qubely:1.6.9
-
cpe:2.3:a:themeum:qubely:1.7.0
-
cpe:2.3:a:themeum:qubely:1.7.1
-
cpe:2.3:a:themeum:qubely:1.7.2
-
cpe:2.3:a:themeum:qubely:1.7.3
-
cpe:2.3:a:themeum:qubely:1.7.4
-
cpe:2.3:a:themeum:qubely:1.7.5
-
cpe:2.3:a:themeum:qubely:1.7.6
-
cpe:2.3:a:themeum:qubely:1.7.7