High vulnerability
CVE-2023-1895: CVE-2023-1895
Tracked since May 6, 2026
CVSS Breakdown
CVSS Base Score
Attack Vector
N/A
Requires physical access to exploit.
CIA Impact
Confidentiality N/A
Integrity N/A
Availability N/A
Exploit Probability (EPSS)
NaN%
NaN% probability of exploitation in 30 days
This vulnerability has a relatively low exploitation probability, but should still be patched according to your standard timelines.
Low
Insurance Impact Assessment
🛡️
Significant Impact
High-severity vulnerabilities may affect cyber insurance pricing and coverage terms. Demonstrating patch management reduces underwriting friction.
CVE CVE-2023-1895 with CVSS 8.5. The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Server Side Request Forgery via the get_remote_content REST API endpoint in versions up to, and including, 1.8.3. This can allow authenticated attackers with subscriber-level permissions or above to make web requests to arbitrary lo
Assess your exposure
Is your organization vulnerable? Run a free domain exposure scan to check.
Related Threats
CVE-2023-34992: A improper neutralization of special elements used in an os command ('os command
CVSS critical
CVE-2023-34976: A SQL injection vulnerability has been reported to affect Video Station. If expl
CVSS critical
CVE-2023-25960: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVSS critical
CVE-2023-4994: The Allow PHP in Posts and Pages plugin for WordPress is vulnerable to Remote Co
CVSS critical
CVE-2023-5201: The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in vers
CVSS critical