Impact
The g-FFL Cockpit plugin for WordPress contains an IP‑based authorization flaw that can be spoofed in the handle_enqueue_only() routine; as a result, attackers who are not logged in can delete any product created in the system. This flaw allows loss of data and availability damage but does not grant code execution or broader system compromise.
Affected Systems
All installations of the garidium:g-FFL Cockpit plugin that are version 1.7.1 or earlier are affected. These are WordPress sites that have uploaded g-FFL Cockpit to manage product listings.
Risk and Exploitability
The vulnerability scores a CVSS of 5.3, indicating moderate severity, and the EPSS is below 1 %, meaning the current likelihood of exploitation is very low. It is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves the attacker forging an IP address recognized by the plugin, triggering the deletion routine without authenticating. Once exploited, the attacker can remove arbitrary product entries, potentially disrupting storefronts or catalogs.
OpenCVE Enrichment