VYPR
Medium severity4.3NVD Advisory· Published Jan 24, 2025· Updated Apr 23, 2026

CVE-2025-24751

CVE-2025-24751

Description

Missing Authorization vulnerability in GoDaddy CoBlocks coblocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CoBlocks: from n/a through <= 3.1.13.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CoBlocks WordPress plugin ≤3.1.13 has a missing authorization vulnerability allowing unprivileged users to perform higher-privileged actions; update to 3.1.14.

Vulnerability

Overview

The CoBlocks WordPress plugin, versions up to and including 3.1.13, contains a missing authorization vulnerability. This flaw stems from incorrectly configured access control security levels, allowing functions that should require higher privileges to be executed without proper checks [1].

Exploitation

Details

An attacker can exploit this vulnerability by sending crafted requests to the WordPress site without needing any prior authentication. The missing authorization check means that any unprivileged user—or even an unauthenticated visitor—can trigger actions intended for administrators or other higher-privileged roles. This type of broken access control is commonly targeted in mass-exploit campaigns, as it enables attackers to compromise thousands of sites with minimal effort [1].

Impact

Successful exploitation allows an attacker to perform unauthorized actions within the WordPress environment, potentially leading to site defacement, data theft, or further privilege escalation. The vulnerability is rated Medium severity (CVSS 4.3) due to the low complexity and network-based attack vector, though the actual impact depends on the specific functions exposed [1].

Mitigation

The vulnerability has been patched in version 3.1.14 of the CoBlocks plugin. Users are strongly advised to update immediately. For those unable to update, contacting a hosting provider or web developer for assistance is recommended. Patchstack users can enable auto-updates for vulnerable plugins to stay protected [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.