Impact
The vulnerability is a Cross‑Site Request Forgery that permits an attacker to inject arbitrary scripts into content stored by the Easy Tynt WordPress plugin. This leads to persistent, stored cross‑site scripting that can execute in the browsers of site visitors, compromising the integrity of the site's content and potentially exposing user data.
Affected Systems
The affected software is the WordPress Easy Tynt plugin released by scottswezey, versions from the earliest release through 0.2.5.1 inclusive.
Risk and Exploitability
With a CVSS score of 7.1 the vulnerability is considered high severity. The EPSS score is below 1% meaning the likelihood of exploitation is low, and the issue is not listed in the CISA KEV catalog. The likely attack vector is a CSRF request originating from an authenticated site administrator or another user with sufficient privileges to submit content, exploiting the lack of proper CSRF protection around content creation endpoints.
OpenCVE Enrichment
EUVD