Access violation vulnerability in Qubely – Advanced Gutenberg Blocks 1.7.8

Qubely is a plugin for WordPress websites. A security vulnerability was found in versions up to 1.7.8, which allowed users with the lowest access level (subscribers) to change the plugin’s settings. This was due to a missing authorization check for the ajax_update_qubely_options() function that is called by the wp_ajax_update_qubely_options AJAX action. This allowed any authenticated user to access it.

Detected in:

Qubely – Advanced Gutenberg Blocks fixed vulnerable versions: >= * <= 1.7.8

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.