CVE-2021-38312
📋 TL;DR
This vulnerability in the Gutenberg Template Library & Redux Framework WordPress plugin allows users with 'edit_posts' capability (like contributors) to install arbitrary plugins from the WordPress repository and edit arbitrary posts. It affects WordPress sites using vulnerable plugin versions due to incorrect authorization checks in REST API endpoints.
💻 Affected Systems
- Gutenberg Template Library & Redux Framework WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers with contributor-level access can install malicious plugins, gain administrative privileges, and completely compromise the WordPress site.
Likely Case
Malicious contributors or compromised contributor accounts install plugins to escalate privileges, modify content, or establish persistence.
If Mitigated
With proper user role management and plugin restrictions, impact is limited to unauthorized plugin installations by authorized users.
🎯 Exploit Status
Exploitation requires contributor-level access or higher. Public exploit code exists in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.2.12
Vendor Advisory: https://wordpress.org/plugins/redux-framework/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Gutenberg Template Library & Redux Framework'. 4. Click 'Update Now' if available, or manually update to version 4.2.12+. 5. Verify update completed successfully.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the plugin until patched
wp plugin deactivate redux-framework
Restrict user capabilities
allRemove 'edit_posts' capability from contributors or restrict plugin installation permissions
Use WordPress role editor plugins or custom code to modify capabilities
🧯 If You Can't Patch
- Remove contributor and author roles or restrict their capabilities
- Implement web application firewall rules to block requests to /wp-json/redux/v1/templates/ endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for 'Gutenberg Template Library & Redux Framework' version <= 4.2.11
Check Version:
wp plugin list --name=redux-framework --field=version
Verify Fix Applied:
Verify plugin version is 4.2.12 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-json/redux/v1/templates/* from non-admin users
- Plugin installation logs from contributor-level users
- Unauthorized post modifications by contributors
Network Indicators:
- HTTP requests to WordPress REST API redux/v1/templates endpoints
- Plugin installation requests from non-privileged users
SIEM Query:
source="wordpress" AND (uri_path="/wp-json/redux/v1/templates/*" OR action="plugin_install") AND user_role!="administrator"