Impact
The vulnerability allows unauthenticated attackers to inject arbitrary content into the plugin’s log files. The inserted content can corrupt logs or trigger log file exhaustion, resulting in denial of service. The weakness corresponds to CWE‑117, indicating insufficient input validation before writing to a file.
Affected Systems
Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue WordPress plugin, versions 1.47 and older. Sites running any of these versions should verify the installed plugin version and plan an upgrade.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, while the EPSS score of less than 1% suggests a low current likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw without authentication by sending crafted data to the plugin’s logging mechanism, which appends it to a file. This can drain disk space or corrupt logs, disrupting site operations.
OpenCVE Enrichment