Impact
The vulnerability exists in WP Social Ninja versions up to 4.0.1 and is caused by a missing capability check on the getAdvanceSettings and saveAdvanceSettings functions. This flaw allows any unauthenticated user to view and change the plugin’s advanced settings, effectively granting unauthorized access to sensitive configuration data and the ability to alter its behavior. The underlying weakness is a missing authorisation control (CWE‑862).
Affected Systems
The affected product is WP Social Ninja – Embed Social Feeds, Customer Reviews & Chat Widgets from vendor adreastrian. All releases up to and including version 4.0.1 are vulnerable; no later versions are listed as affected.
Risk and Exploitability
The CVSS base score for this flaw is 6.5, indicating moderate severity. The EPSS score is reported as less than 1%, suggesting a low probability of exploitation at the time of this analysis. The vulnerability is not listed in the CISA KEV catalog, and the attack vector is inferred to be via the plugin’s REST API endpoints that handle advanced settings, which can be accessed by unauthenticated users.
OpenCVE Enrichment