Impact
The WordPress plugin ‘Comment Edit Core – Simple Comment Editing’ is affected by a CVE that allows unauthenticated attackers to retrieve sensitive user details through the ajax_get_comment function. The vulnerability directly exposes user identifiers, IP addresses, and email addresses, compromising confidentiality as defined by CWE‑200. Given the design of the plugin, an attacker gains no denial‑of‑service or code execution capability, but the disclosure of personal data can enable further targeted attacks such as phishing or credential harvesting.
Affected Systems
All installations of the WordPress plugin ‘Comment Edit Core – Simple Comment Editing’ running version 3.1.0 or earlier are impacted. The affected product is provided by the vendor ronalfy and is deployed via the WordPress plugin infrastructure. In practice, any WordPress site enabled with this plugin without an updated version will be exposed.
Risk and Exploitability
The CVSS score of 5.3 indicates a medium severity vulnerability, and the EPSS score of <1% suggests a low likelihood of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog, further supporting the assessment that exploitation is unlikely to be seen in the wild. Attackers can trigger the flaw by issuing a simple Ajax request to the ajax_get_comment endpoint with no authentication; learning the user ID or email does not require additional privileges, meaning the attack vector is unauthenticated and easily automatable.
OpenCVE Enrichment