Impact
The plugin fails to verify user permissions for the AJAX action that provides a backup of all settings, allowing anyone who can reach the endpoint to retrieve confidential configuration data. The weakness is a classic missing authorization flaw as described by CWE‑862. The impact is the disclosure of sensitive configuration that could assist in further attacks against the WordPress site.
Affected Systems
WordPress sites that use the IP2Location Redirection plugin versions up to and including 1.33.3 are affected. The issue is present in all releases of the plugin through 1.33.3 and affects any instance where the plugin is installed, regardless of theme or other plugins.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% shows a low probability of exploitation today; the vulnerability is not yet listed in the CISA KEV catalog. Attackers can trigger the flaw by sending an unauthenticated HTTP request to the AJAX URL for download_ip2location_redirection_backup, which returns the full backup file. Because no authentication checks occur, the data is exposed without restrictions.
OpenCVE Enrichment
EUVD