Impact
The Featured Image via URL plugin for WordPress lacks file-type validation in all releases up to 0.1, allowing an authenticated attacker with Contributor or higher access to upload any file to the server. Uploaded files can be crafted to contain malicious code, which, if placed in an executable location, may lead to remote code execution. The consequence is a compromise of data confidentiality, integrity, and availability on the affected site.
Affected Systems
The vulnerability affects all installations of the Featured Image via URL WordPress plugin with version 0.1 or older. Any site that has installed this plugin and grants Contributor or higher roles to users is at risk.
Risk and Exploitability
The CVSS score of 8.8 reflects high severity, yet the EPSS score of less than 1% indicates that the exploit probability is currently low, and the issue is not listed in CISA's KEV catalog. The attack vector requires authenticated access; attackers gain upload privileges through the plugin's Contributor or higher capabilities. Because the flaw allows arbitrary file uploads, the risk level warrants immediate attention.
OpenCVE Enrichment