Impact
The WP Front User Submit plugin contains a missing capability check on the '/wp-json/bfe/v1/revert' REST API endpoint that allows any unauthenticated attacker to delete arbitrary media attachments from the WordPress media library. This vulnerability can be used to remove important files, disrupt site functionality, or sabotage the website’s content integrity. The weakness is categorized as a missing authorization problem (CWE‑862).
Affected Systems
The vulnerability affects the Aharonyan Guest posting / Frontend Posting / Front Editor – WP Front User Submit plugin for WordPress in all releases up to and including version 5.0.0. No other vendors or product variants are listed in the CNA data.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate risk, while the EPSS score of less than 1% suggests a very low probability that the flaw will be actively exploited today. The vulnerability is not listed in the CISA KEV catalog. An attacker can target the flaw by sending a crafted request directly to the /wp-json/bfe/v1/revert endpoint without needing authentication, thereby triggering the deletion operation.
OpenCVE Enrichment