Impact
The WebP Express plugin for WordPress is vulnerable because it fails to randomize the name of its configuration file, allowing direct file access on NGINX servers. This flaw permits unauthenticated users to retrieve the configuration file and read sensitive internal settings. The vulnerability falls under CWE-200, which concerns the inadvertent exposure of information.
Affected Systems
Any WordPress site using the roselldk WebP Express plugin up to and including version 0.25.9 is affected. Users operating older versions of the plugin without an upgrade present a potential attack surface.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. The EPSS score is less than 1 % and the vulnerability is not listed in the CISA KEV catalog, suggesting a low probability of exploitation in the wild. Attackers could exploit the flaw remotely by issuing a standard HTTP request that targets the predictable configuration file name, gaining access to the file’s contents.
OpenCVE Enrichment