Impact
The vulnerability is a Cross‑Site Request Forgery that enables a malicious site to trigger the CopyLink plugin to store a user‑supplied script; when the script is later displayed, it executes in the browsers of any site visitor, allowing an attacker to steal tokens, deface content, or redirect users. It is inferred that the attacker would need a legitimate user's authenticated session to trigger the malicious request.
Affected Systems
Any WordPress installation that has the DEJAN CopyLink plugin version 1.1 or earlier installed and active.
Risk and Exploitability
The CVSS score of 7.1 indicates a high severity, and the EPSS score of less than 1% suggests limited but not negligible exploitation probability. The issue is not listed in CISA KEV, so no active exploits are documented. It is inferred that exploitation would probably require tricking an authenticated user or administrator into visiting a crafted URL that submits a request to the site, thereby storing malicious code.
OpenCVE Enrichment
EUVD