VYPR
Medium severity4.3NVD Advisory· Published Feb 17, 2026· Updated Apr 15, 2026

CVE-2026-2608

CVE-2026-2608

Description

The Kadence Blocks — Page Builder Toolkit for Gutenberg Editor plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 3.5.32. This makes it possible for authenticated attackers, with Contributor-level access and above, to perform an unauthorized action.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Kadence Blocks plugin for WordPress ≤3.5.32 lacks a capability check, allowing Contributor+ users to perform an unauthorized action.

The Kadence Blocks — Page Builder Toolkit for Gutenberg Editor plugin for WordPress is vulnerable to a broken access control issue in all versions up to and including 3.5.32. The vulnerability stems from a missing capability check on a specific function, which fails to properly verify whether the user has the required permissions to perform the action [1]. This oversight allows authenticated users with elevated privileges to bypass intended authorization boundaries.

To exploit this vulnerability, an attacker must first obtain a valid WordPress user account with at least Contributor-level access. Once authenticated, they can directly invoke the unprotected function without needing any additional authentication or nonce validation. The attack is performed over the web interface and does not require any special network position or complex prerequisites [1].

The impact of this flaw is that an authenticated Contributor or higher can perform an action that should be restricted to higher-privileged roles such as Editor or Administrator. The exact action is not detailed, but the vulnerability is classified as a broken access control issue, meaning it could allow unauthorized post publication or other sensitive operations [1]. The CVSS score of 4.3 (Medium) reflects the requirement for authentication and the limited scope of the unauthorized action.

The vendor has released version 3.6.0 of the Kadence Blocks plugin which addresses the vulnerability by implementing the missing capability check. Users are strongly advised to update to this version or later. Automated updates via a patch management tool can also be enabled to protect against exploitation [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.