{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T09:21:25.983","vulnerabilities":[{"cve":{"id":"CVE-2026-2371","sourceIdentifier":"security@wordfence.com","published":"2026-03-07T00:16:13.457","lastModified":"2026-04-22T21:27:27.950","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 12.8.3. This is due to missing authorization and post status validation in the `gspb_el_reusable_load()` AJAX handler. The handler accepts an arbitrary `post_id` parameter and renders the content of any `wp_block` post without checking `current_user_can('read_post', $post_id)` or verifying the post status. Combined with the nonce being exposed to unauthenticated users on any public page using the `[wp_reusable_render]` shortcode with `ajax=\"1\"`, this makes it possible for unauthenticated attackers to retrieve the rendered HTML content of private, draft, or password-protected reusable blocks."},{"lang":"es","value":"El plugin Greenshift – bloques de animación y constructor de páginas para WordPress es vulnerable a Referencia Directa Insegura a Objeto en todas las versiones hasta la 12.8.3, inclusive. Esto se debe a la falta de autorización y validación del estado de la publicación en el gestor AJAX 'gspb_el_reusable_load()'. El gestor acepta un parámetro 'post_id' arbitrario y renderiza el contenido de cualquier publicación 'wp_block' sin verificar 'current_user_can('read_post', $post_id)' o el estado de la publicación. Combinado con que el nonce se expone a usuarios no autenticados en cualquier página pública que utilice el shortcode '[wp_reusable_render]' con 'ajax=\"1\"', esto hace posible que atacantes no autenticados recuperen el contenido HTML renderizado de bloques reutilizables privados, en borrador o protegidos con contraseña."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/greenshift-animation-and-page-builder-blocks/tags/12.7.1/settings.php#L1630","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/greenshift-animation-and-page-builder-blocks/tags/12.7.1/settings.php#L1674","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/greenshift-animation-and-page-builder-blocks/trunk/settings.php#L1674","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/changeset/3465111/greenshift-animation-and-page-builder-blocks/trunk/settings.php","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/52632b50-9755-4ebd-a1a8-587cc633debb?source=cve","source":"security@wordfence.com"}]}}]}