Impact
The Live CSS Preview plugin for WordPress contains a missing capability check on its AJAX endpoint 'wp_ajax_frontend_save'. This vulnerability allows an authenticated user with Subscriber-level access or higher to modify the plugin's CSS settings without proper authorization. The flaw results in unauthorized alteration of configuration data, which could be used to affect site appearance or embed malicious code, representing a potential data integrity issue.
Affected Systems
The vulnerability affects the Live CSS Preview plugin by Dojo Digital for WordPress versions up to and including 2.1.4. Any WordPress site running one of these versions is a potential target.
Risk and Exploitability
The CVSS score of 4.3 indicates a moderate severity vulnerability. The EPSS score of less than 1% suggests that exploitation is unlikely but still possible, especially to users who can log in as a Subscriber or higher. The flaw is not listed in CISA's KEV catalog, meaning no confirmed exploitation has been reported. The likely attack vector is a web-based authenticated request to the vulnerable AJAX endpoint, where an attacker can change the CSS settings by supplying the required parameters.
OpenCVE Enrichment