Description
WordPress Plugin Essential Blocks-Page Builder Gutenberg Blocks, Patterns & Templates is prone to multiple vulnerabilities that lets remote attackers inject and execute arbitrary code because the application fails to sanitize user-supplied input before being passed to the unserialize() PHP function. Attackers can possibly exploit these issues to execute arbitrary PHP code within the context of the affected webserver process. WordPress Plugin Essential Blocks-Page Builder Gutenberg Blocks, Patterns & Templates version 4.2.0 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 4.2.1 or latest
References
Related Vulnerabilities
WordPress Plugin Mingle Forum SQL Injection and Security Bypass Vulnerabilities (1.0.26)
WordPress Plugin Comment Rating 'path' Parameter Cross-Site Scripting (2.9.20)
WordPress Plugin Meks Flexible Shortcodes Cross-Site Scripting (1.3.4)
WordPress Plugin Paytium:Mollie payment forms & donations Cross-Site Scripting (3.1.1)
Django Incorrect Default Permissions Vulnerability (CVE-2019-19118)