Impact
The Quick Featured Images plugin for WordPress is vulnerable to an insecure direct object reference in all versions up to 13.7.2. The vulnerability stems from missing validation on a user‑controlled key for the AJAX actions qfi_set_thumbnail and qfi_delete_thumbnail. Authenticated users with author-level access or higher can therefore change or delete other users’ featured images, compromising the integrity of published content. This weakness is classified as CWE‑639, a broken access control flaw.
Affected Systems
The affected product is the Quick Featured Images WordPress plugin, version 13.7.2 and earlier. The issue affects any WordPress installation that has this plugin installed and grants at least author‑level access to users.
Risk and Exploitability
The CVSS score of 4.3 indicates a low to moderate severity. The EPSS score of < 1% suggests a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be authenticated: an attacker must possess a legitimate WordPress user account with author or higher permissions to exploit the flaw.
OpenCVE Enrichment