Impact
The Userback WordPress plugin version 1.0.15 and earlier contains a missing capability check in the userback_get_json function. This flaw allows authenticated users who possess at least Subscriber privileges to retrieve the plugin’s configuration data, including the Userback API access token, and the content of the site’s posts and pages, even if those items are marked as private or draft. The weakness aligns with CWE-862 (Missing Authorization).
Affected Systems
All WordPress sites running the Userback plugin version 1.0.15 or earlier are affected. The plugin can be found under the vendor name userback:Userback.
Risk and Exploitability
The CVSS score of 4.3 indicates moderate overall impact. The EPSS score of less than 1% suggests the likelihood of exploitation at the time of analysis is very low, and the vulnerability is not listed in the CISA KEV catalog. The most likely attack vector is an authenticated user with Subscriber or higher privileges. The attacker can read configuration data and private content.
OpenCVE Enrichment