Kadence Blocks — Page Builder Toolkit for Gutenberg Editor Vulnerab…

Kadence Blocks — Page Builder Toolkit for Gutenberg Editor Vulnerab…

by | Feb 17, 2026 | Plugins

Attack Vectors

The vulnerability CVE-2026-1857 affects the WordPress plugin Kadence Blocks — Page Builder Toolkit for Gutenberg Editor (slug: kadence-blocks) in versions up to and including 3.6.1, and is rated Medium severity (CVSS 4.3). It is an authenticated issue, meaning an attacker must have a valid WordPress login.

The most relevant risk scenario for business teams is a compromised or malicious internal account with Contributor access (or higher). Because the affected REST API handler’s permission check only requires the ability to edit posts, an attacker with that level of access may be able to trigger server-side requests to endpoints they control or choose via the endpoint parameter. In practical terms, this can turn your website into a “proxy” that makes network requests on the attacker’s behalf.

This is especially important for organizations that grant temporary Contributor access to external agencies, freelancers, partners, or multiple internal teams—common in marketing-driven WordPress environments—because it expands the pool of accounts that could be abused if credentials are stolen or misused.

Security Weakness

CVE-2026-1857 is a Server-Side Request Forgery (SSRF) weakness caused by insufficient validation of the endpoint parameter in the plugin’s GetResponse REST API handler (get_items()). In short, the plugin does not sufficiently restrict where the server is allowed to connect when processing certain requests.

A key business-risk detail is that the permission check is too permissive: it allows users with the edit_posts capability (Contributor role) rather than restricting the action to higher-privilege administrative controls (such as manage_options). That mismatch between privilege level and network-impacting functionality increases the likelihood of misuse in real-world environments where Contributor accounts are common.

Even though the summary notes requests to “arbitrary endpoints on the configured GetResponse,” the core takeaway is that an authenticated user with relatively low privileges can influence server-to-server connections, which is a class of issue that often bypasses controls designed to protect public-facing users.

Technical or Business Impacts

From a business perspective, SSRF issues like CVE-2026-1857 can create unexpected exposure because they originate from your website server—an environment that may have trusted access to internal tools or third-party services. While this specific vulnerability is rated Medium (CVSS 4.3) with limited confidentiality impact in the published scoring, it still represents a meaningful governance and risk-management concern for marketing and corporate stakeholders.

Potential impacts include: increased risk of sensitive data exposure depending on what the server can reach; misuse of your infrastructure to perform unwanted outbound requests; security and compliance complications if the website is used as a stepping stone to probe internal or partner-connected services; and brand or customer-trust damage if the incident results in visible disruption, investigation, or reporting obligations.

Recommended remediation is straightforward: update Kadence Blocks — Page Builder Toolkit for Gutenberg Editor to version 3.6.2 or newer, which is identified as the patched release. As a practical governance step, review who has Contributor access, remove stale accounts, and ensure least-privilege access aligns with the responsibilities of agencies and content teams.

Similar Attacks

SSRF has been used in high-profile incidents to reach internal services and extract sensitive information. Examples include the Capital One breach (involving access to cloud metadata services): U.S. Department of Justice press release.

Another widely cited SSRF case involved accessing cloud instance metadata to obtain credentials and pivot within environments, as described in research on the “Capital One” style of cloud SSRF exploitation: Wiz research on SSRF in cloud environments.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers