Impact
The vulnerability in the Wise Analytics WordPress plugin arises from a missing capability check on the REST API endpoint '/wise-analytics/v1/report'. An unauthenticated attacker can send a request containing a 'name' parameter and retrieve sensitive analytics data, including administrator usernames, login timestamps, visitor tracking details, and business intelligence metrics. This flaw results in an information disclosure that could aid further targeted attacks.
Affected Systems
The issue affects all installations of the Wise Analytics plugin for WordPress up to and including version 1.1.9.
Risk and Exploitability
The vulnerability carries a CVSS score of 5.3, indicating moderate severity. The EPSS score is below 1%, suggesting that the likelihood of exploitation is very low at present. It is not listed in the CISA KEV catalogue. An attacker would exploit the vector by issuing unauthenticated HTTP requests to the exposed REST endpoint.
OpenCVE Enrichment