Medium severity4.3NVD Advisory· Published Jan 20, 2024· Updated Apr 8, 2026
CVE-2024-0623
CVE-2024-0623
Description
The VK Block Patterns plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.31.1.1. This is due to missing or incorrect nonce validation on the vbp_clear_patterns_cache() function. This makes it possible for unauthenticated attackers to clear the patterns cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected products
1- cpe:2.3:a:vektor-inc:vk_block_patterns:*:*:*:*:*:wordpress:*:*Range: <=1.31.1.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- plugins.trac.wordpress.org/changesetnvdPatch
- www.wordfence.com/threat-intel/vulnerabilities/id/9af6c319-7660-4368-b2f8-1ed1d01ee73anvdThird Party Advisory
News mentions
0No linked articles in our index yet.