Impact
Custom Bulk/Quick Edit allows an attacker to submit a forged request that triggers bulk or quick edit operations on behalf of a logged‑in user without that user’s consent. The vulnerability could lead to unauthorized modification or deletion of content, compromising data integrity. The weakness is classified as CWE-352, a classic CSRF flaw.
Affected Systems
The issue targets the WordPress plugin Custom Bulk/Quick Edit from Michael Cannon, affecting all releases through version 1.6.10 inclusive.
Risk and Exploitability
The CVSS score of 4.3 indicates moderate severity, while the EPSS value of less than 1% suggests a low probability of mass exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector involves an attacker crafting a malicious link that exploits a user who is already authenticated and has permission to perform bulk edits; visiting that link would execute an unintended action.
OpenCVE Enrichment
EUVD