Impact
The Truefy Embed plugin fails to perform nonce validation on the truefy_embed_options_update action, allowing an unauthenticated attacker to forge a request that causes an authenticated administrator to change the plugin’s settings, including the API key. By exploiting this flaw the attacker can gain unauthorized control over the plugin configuration, potentially leading to further compromise of the site.
Affected Systems
All WordPress sites that use the Truefy Embed plugin version 1.1.0 or earlier are impacted. No specific WordPress core version is noted, so any installation running the affected plugin is at risk.
Risk and Exploitability
The CVSS score for this issue is 4.3 and the EPSS score is below 1%, indicating a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw via a CSRF attack: an adversary convinces a logged‑in administrator to click a crafted link or submit a malicious form, which then updates the plugin settings without further authentication.
OpenCVE Enrichment