Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor Vul…

Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor Vul…

by | Feb 26, 2026 | Plugins

Attack Vectors

Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor (slug: gutentor) versions up to and including 3.5.2 contain a Medium-severity authorization issue (CVE-2025-58680, CVSS 5.4). The primary attack vector is an authenticated WordPress user account with contributor-level access or higher.

This means an attacker does not need to compromise an administrator account first; they only need any valid low-privilege login (for example, a compromised contributor account, a reused password, or an account created through a workflow that grants contributor access). No user interaction is required once the attacker is logged in.

Reference: CVE-2025-58680. Independent write-up: Wordfence vulnerability record.

Security Weakness

The vulnerability is described as missing authorization (a missing capability check) on a plugin function in Gutentor <= 3.5.2. In practical terms, the plugin does not sufficiently verify that a logged-in user has the required permission to perform a specific action.

Because the check is missing, a user who should not be allowed to perform that action (but is authenticated) may be able to do so anyway. This is a common class of WordPress plugin risk because it can quietly undermine role-based access controls that executives and compliance teams rely on (e.g., the assumption that contributors can only draft content).

Remediation: Update Gutentor to version 3.5.3 or newer (patched) as recommended by the public advisory.

Technical or Business Impacts

While this issue is rated Medium, it can still create meaningful business exposure because it expands what a low-privilege account can do inside WordPress. Depending on your publishing workflow and how the affected function is used in your environment, the impact can include unauthorized changes that may affect site content, site presentation, or operational settings.

For marketing and leadership teams, the most likely business risks include:

Brand and campaign risk: Unauthorized actions can lead to unexpected on-site changes that undermine campaign integrity, messaging consistency, and customer trust.

Compliance and audit risk: If contributors can perform actions outside their intended role, it can weaken internal controls and complicate attestations around “least privilege,” approval workflows, and change management.

Incident cost: Even limited unauthorized changes can trigger emergency response work (restores, content review, forensic checks), distracting teams and increasing operational costs.

Similar Attacks

Missing authorization / access-control weaknesses are a recurring theme across many platforms and products. Real-world examples include:

CVE-2023-38646 (Metabase) – an authorization flaw that allowed access to sensitive information under certain conditions.

CVE-2020-11738 (WordPress) – a WordPress core issue involving improper permission checks that could enable unintended actions.

CVE-2023-20198 (Cisco IOS XE) – an access/privilege-related web UI weakness that was widely abused, highlighting how quickly attackers operationalize authorization gaps.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers