Impact
The azurecurve Shortcodes in Comments plugin allows an attacker to execute any shortcode string submitted through a comment, because the input is passed to do_shortcode without proper validation. This flaw enables unauthenticated users to run arbitrary code within the context of the WordPress site, potentially leading to full site compromise, data theft, or defacement.
Affected Systems
WordPress sites that have the azurecurve Shortcodes in Comments plugin installed with a version up to and including 2.0.2 are affected. No other products or versions are listed as impacted.
Risk and Exploitability
The vulnerability scores a CVSS of 7.3, indicating high severity, and an EPSS of 1%, showing it is considered a realistic exploitation candidate. It is not listed in the CISA KEV catalog. The attack vector is unauthenticated comment submission, meaning any visitor can exploit the flaw without needing privileged access.
OpenCVE Enrichment
EUVD