Greenshift – animation and page builder blocks Vulnerability (Mediu…

Greenshift – animation and page builder blocks Vulnerability (Mediu…

by | Mar 6, 2026 | Plugins

Attack Vectors

Greenshift – animation and page builder blocks (slug: greenshift-animation-and-page-builder-blocks) has a Medium severity issue (CVSS 5.3, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) that can be exploited over the internet without requiring a logged-in account.

The weakness involves an AJAX action, gspb_el_reusable_load, that accepts an arbitrary post_id and can render the content of WordPress reusable blocks (wp_block posts). In practical terms, if your site exposes the relevant nonce to unauthenticated visitors on any public page using the [wp_reusable_render] shortcode, an attacker may be able to request reusable block content by providing different post_id values.

Security Weakness

This vulnerability (CVE-2026-2371) is an Insecure Direct Object Reference (IDOR) caused by missing authorization and post status validation in the gspb_el_reusable_load() handler. According to the published advisory, the handler does not check current_user_can('read_post', $post_id) and does not verify the target post’s status before rendering.

From a business-risk perspective, the core problem is simple: content that was intended to be private (or at least not publicly accessible) can be disclosed if it exists as a reusable block and an attacker can reference its ID.

Technical or Business Impacts

The primary impact is information disclosure (confidentiality impact: low per CVSS, but still meaningful for many organizations). Private reusable blocks can contain marketing plans, draft campaign copy, unpublished landing page messaging, pricing notes, internal legal/compliance wording, or other content that was never intended for public viewing.

For marketing directors and executives, the real-world risks can include: premature release of campaign details, brand or PR issues from exposing draft language, competitive intelligence leakage (offers, positioning, and segmentation), and downstream compliance concerns if regulated statements or internal approvals are exposed before review.

Remediation: Update Greenshift to 12.8.4 or newer (patched). After updating, review where reusable blocks are used and confirm that private or draft reusable content cannot be retrieved by unauthenticated visitors.

Similar Attacks

Authorization gaps and direct object reference issues are a common theme in web application incidents, where attackers access data they shouldn’t simply by referencing predictable identifiers.

Examples of real-world incidents involving unauthorized data exposure include:

Drizly data breach and FTC action (2022) — a high-profile case highlighting the business and regulatory consequences of inadequate access controls and security safeguards.

Uber incident and legal consequences (U.S. DOJ, 2022) — demonstrates how security failures can quickly become executive-level and legal-risk issues.

Facebook-related user data exposure reports (2019) — an example of how exposed data can lead to reputational damage and compliance scrutiny.

References

CVE: CVE-2026-2371

Advisory source: Wordfence vulnerability record

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers