Impact
The Chartify plugin contains an unauthenticated AJAX endpoint that dispatches to privileged admin methods without nonce or capability verification. This allows anyone to invoke administrative functions through wp-admin/admin-ajax.php. An attacker who can determine what method names are exposed could modify or delete chart data, change user settings, or potentially inject code, compromising the site’s integrity and confidentiality. The weakness is identified as CWE-306.
Affected Systems
The vulnerability affects the ays-pro Chartify – WordPress Chart Plugin version 3.5.9 and earlier. Sites running WordPress with any of these plugin versions are at risk if the plugin is installed and unchanged.
Risk and Exploitability
The CVSS base score of 5.3 indicates moderate risk, and the EPSS score of less than 1 % suggests exploitation is presently unlikely. The vulnerability is not listed in CISA’s KEV catalog. Attackers can exploit it via the public wp-admin/admin-ajax.php endpoint once they discover callable method names; no special privileges or network access are required beyond the ability to send HTTP requests.
OpenCVE Enrichment