Impact
The SEO Plugin by Squirrly SEO has a missing capability check in the sq_ajax_uninstall function in all releases up to and including 12.4.14. This flaw allows any authenticated user with Subscriber-level access or higher to call the uninstall action that disconnects the WordPress site from Squirrly’s cloud service. The consequence is loss of connectivity to the cloud service and the disabling of associated SEO features, but the attack does not expose data or enable remote code execution.
Affected Systems
WordPress sites that use the Squirrly SEO plugin, any installation running version 12.4.14 or earlier of the plugin.
Risk and Exploitability
The CVSS score of 4.3 places this issue in the low severity range; the EPSS score is below 1 %, indicating a very low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an authenticated account with Subscriber or higher privileges and involves sending the sq_ajax_uninstall request to the plugin endpoint. Overall risk remains modest but addressing the issue is recommended to maintain cloud connectivity.
OpenCVE Enrichment