Vulnerability Description
The Responsive Blocks – Page Builder for Blocks & Patterns plugin for WordPress is vulnerable to Unauthenticated Open Email Relay in all versions up to, and including, 2.2.0. This is due to insufficient authorization checks and missing server-side validation of the recipient email address supplied via a public REST API route. This makes it possible for unauthenticated attackers to send arbitrary emails to any recipient of their choosing through the affected WordPress site's mail server, effectively turning the site into an open mail relay.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/responsive-block-editor-addons/tags/2
- https://plugins.trac.wordpress.org/browser/responsive-block-editor-addons/tags/2
- https://plugins.trac.wordpress.org/browser/responsive-block-editor-addons/tags/2
- https://plugins.trac.wordpress.org/browser/responsive-block-editor-addons/trunk/
- https://plugins.trac.wordpress.org/browser/responsive-block-editor-addons/trunk/
- https://plugins.trac.wordpress.org/browser/responsive-block-editor-addons/trunk/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/17452a29-bcef-451a-989
FAQ
What is CVE-2026-6675?
CVE-2026-6675 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The Responsive Blocks – Page Builder for Blocks & Patterns plugin for WordPress is vulnerable to Unauthenticated Open Email Relay in all versions up to, and including, 2.2.0. This is due to insufficie...
How severe is CVE-2026-6675?
CVE-2026-6675 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-6675?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.