CrowdSec
10/10CrowdSec Score

Essential Blocks Plugin - Path Traversal (CVE-2023-6623)

Published on15-01-2024
First seen on04-12-2024

7Exploiting IPs reported

The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.

CrowdSec analysis

The Essential Blocks WordPress plugin before version 4.4.3 is vulnerable to a path traversal flaw, tracked as CVE-2023-6623 that allows unauthenticated attackers to overwrite local variables during template rendering via the REST API. This vulnerability can be exploited to perform Local File Inclusion attacks, potentially exposing sensitive files or enabling further compromise of the affected WordPress site.

CrowdSec has been tracking this vulnerability and its exploits since 8th of May 2024.

Data from the CrowdSec community indicates that exploitation of CVE-2023-6623 is highly selective and intelligence-driven. Threat actors use advanced reconnaissance and carefully choose their targets, often as part of sophisticated campaigns or advanced persistent threat operations. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2023-6623 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2023-6623 is currently experiencing high visibility and active exploitation across the internet.

Attackers exploit the /wp-json/essential-blocks/v1/queries endpoint by supplying path traversal sequences in the file parameter to include arbitrary files from the server, potentially leading to sensitive data disclosure or code execution.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.