VYPR
Medium severity5.3NVD Advisory· Published Mar 7, 2026· Updated Apr 22, 2026

CVE-2026-2371

CVE-2026-2371

Description

The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 12.8.3. This is due to missing authorization and post status validation in the gspb_el_reusable_load() AJAX handler. The handler accepts an arbitrary post_id parameter and renders the content of any wp_block post without checking current_user_can('read_post', $post_id) or verifying the post status. Combined with the nonce being exposed to unauthenticated users on any public page using the [wp_reusable_render] shortcode with ajax="1", this makes it possible for unauthenticated attackers to retrieve the rendered HTML content of private, draft, or password-protected reusable blocks.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.