Kadence Blocks — Page Builder Toolkit for Gutenberg Editor Vulnerab…

Kadence Blocks — Page Builder Toolkit for Gutenberg Editor Vulnerab…

by | Feb 17, 2026 | Plugins

Attack Vectors

CVE-2026-2633 affects Kadence Blocks — Page Builder Toolkit for Gutenberg Editor (also described as “Gutenberg Blocks with AI by Kadence WP”) for WordPress, in versions up to and including 3.6.1. It is rated Medium severity with a CVSS 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).

The core risk is that an authenticated user with Contributor-level access or higher could trigger a WordPress AJAX action (kadence_import_process_image_data) to upload images in a way the site may not intend. This matters most on sites that allow multiple authors, guest contributors, agencies, or partners to log in—common in marketing and content operations.

Because the vulnerability can be reached over the network and does not require user interaction, it can be abused quickly once an attacker has any qualifying account (including accounts created via compromised credentials, reused passwords, or mismanaged access during campaigns).

Security Weakness

This issue is a missing authorization control in the plugin’s process_image_data_ajax_callback() function. While the plugin verifies an AJAX request through verify_ajax_call() and checks for the edit_posts capability, it does not also enforce the upload_files capability.

In practical terms, that gap can allow users who can create or edit content (like Contributors) to perform a media upload operation they may not be permitted to do under your organization’s role-based access policy.

Remediation: Update Kadence Blocks to version 3.6.2 or newer, which includes the patch.

Technical or Business Impacts

For marketing directors, executives, and compliance teams, the key concern is loss of control over what gets introduced into your brand’s digital environment. Even when the CVSS severity is Medium, unauthorized media uploads can create downstream risk, especially on high-visibility marketing sites.

Business impacts may include: brand and reputational damage if unauthorized or misleading imagery appears in your media library or campaigns; increased workload for marketing ops and IT to audit and remove questionable assets; and heightened compliance concerns where content governance, approvals, and auditability are required (for example, regulated industries or public companies).

Technical impacts may include: an expanded attack surface by allowing more users than intended to add external images into the site’s media ecosystem, potentially undermining content controls and increasing the chance of policy violations (e.g., unlicensed images) or malicious content placement via compromised contributor accounts.

More details and references: CVE-2026-2633 record and the research advisory from Wordfence.

Similar Attacks

Authorization gaps that let lower-privileged users perform higher-impact actions (like uploading content or changing site behavior) are a common real-world pattern in WordPress incidents. Here are a few widely reported examples of plugin-related security events and attack patterns that leadership teams often track:

Slider Revolution (“RevSlider”) file upload vulnerabilities (historical pattern) — A well-known example of how file upload and access-control issues in plugins can lead to significant business disruption.

Essential Addons for Elementor vulnerabilities (reported by Wordfence) — Illustrates how popular page-builder ecosystems can become a target when authorization and validation controls are insufficient.

Credential stuffing (Cloudflare overview) — Not a plugin flaw, but a frequent way attackers obtain “Contributor+” access needed to exploit issues like CVE-2026-2633.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers