Impact
The PGS Core plugin for WordPress contains a missing capability check on several functions in all releases up to 5.8.0. This flaw allows an attacker who does not even have authentication credentials to add, alter or delete plugin options and settings, directly manipulating the site configuration and potentially compromising data integrity.
Affected Systems
The affected product is PGS Core supplied by Potenza Global Solutions for WordPress sites. Versions 5.8.0 and earlier are vulnerable; any site running the plugin in those releases is at risk.
Risk and Exploitability
Based on the description, it is inferred that attacks would involve sending crafted HTTP requests to the plugin’s endpoints, manipulating configuration options without any authentication, because the capability checks are missing. The CVSS score of 7.3 indicates high severity. The EPSS score is less than 1% and the vulnerability is not listed in the CISA KEV catalog, suggesting that widespread exploitation is unlikely at present. Nonetheless, the ability for unauthenticated users to modify plugin settings poses a significant risk to data integrity and site stability, especially on large WordPress deployments.
OpenCVE Enrichment
EUVD