CVE-2021-38312

7.1 HIGH

📋 TL;DR

This vulnerability in the Gutenberg Template Library & Redux Framework WordPress plugin allows users with 'edit_posts' capability (like contributors) to install arbitrary plugins from the WordPress repository and edit arbitrary posts. It affects WordPress sites using vulnerable plugin versions due to incorrect authorization checks in REST API endpoints.

💻 Affected Systems

Products:
  • Gutenberg Template Library & Redux Framework WordPress Plugin
Versions: <= 4.2.11
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and at least one user with 'edit_posts' capability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with contributor-level access can install malicious plugins, gain administrative privileges, and completely compromise the WordPress site.

🟠

Likely Case

Malicious contributors or compromised contributor accounts install plugins to escalate privileges, modify content, or establish persistence.

🟢

If Mitigated

With proper user role management and plugin restrictions, impact is limited to unauthorized plugin installations by authorized users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access or higher. Public exploit code exists in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2.12

Vendor Advisory: https://wordpress.org/plugins/redux-framework/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Gutenberg Template Library & Redux Framework'. 4. Click 'Update Now' if available, or manually update to version 4.2.12+. 5. Verify update completed successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched

wp plugin deactivate redux-framework

Restrict user capabilities

all

Remove 'edit_posts' capability from contributors or restrict plugin installation permissions

Use WordPress role editor plugins or custom code to modify capabilities

🧯 If You Can't Patch

  • Remove contributor and author roles or restrict their capabilities
  • Implement web application firewall rules to block requests to /wp-json/redux/v1/templates/ endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'Gutenberg Template Library & Redux Framework' version <= 4.2.11

Check Version:

wp plugin list --name=redux-framework --field=version

Verify Fix Applied:

Verify plugin version is 4.2.12 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-json/redux/v1/templates/* from non-admin users
  • Plugin installation logs from contributor-level users
  • Unauthorized post modifications by contributors

Network Indicators:

  • HTTP requests to WordPress REST API redux/v1/templates endpoints
  • Plugin installation requests from non-privileged users

SIEM Query:

source="wordpress" AND (uri_path="/wp-json/redux/v1/templates/*" OR action="plugin_install") AND user_role!="administrator"

🔗 References

📤 Share & Export