Impact
The Library Management System plugin for WordPress contains a missing capability check within the owt7_library_management_ajax_handler() function in all releases up to and including version 3.1. As described in the CVE, this flaw permits an authenticated user with at least Subscriber privileges to invoke the AJAX endpoint and modify any of the plugin’s configuration values and feature toggles without proper authorization. No additional privileges or network conditions are specified in the vendor material.
Affected Systems
The vulnerability is limited to the Library Management System plugin developed by owthub for WordPress. All versions through 3.1 are affected because the missing privilege guard exists in every build up to that point.
Risk and Exploitability
The CVSS score of 4.3 reflects a moderate severity level. The EPSS score is beneath 1%, indicating limited exploitation evidence. The issue is not present in the CISA KEV catalog. Attackers must be authenticated and hold at least Subscriber rights; the description states this requirement, so the attack vector is considered authenticated access. Once the credentials are available, the attacker can alter plugin settings directly via the vulnerable AJAX handler.
OpenCVE Enrichment