Impact
The vulnerability stems from improper control of a filename supplied to a PHP include/require statement, enabling local file inclusion. By manipulating the path parameter used by the Just Post Preview Widget plugin, an attacker can read arbitrary server files or execute code, potentially disclosing sensitive data or achieving full site compromise.
Affected Systems
WordPress installations that use the Just Post Preview Widget plug‑in produced by Alex Prokopenko / JustCoded, versions 1.1.1 and earlier are affected.
Risk and Exploitability
The CVSS score of 7.5 signals a high severity risk, but the EPSS score of less than 1% indicates that exploitation events are currently very rare. The vulnerability is not present in the CISA KEV catalog. The likely attack involves sending a crafted request to the plugin’s endpoint that accepts a filename parameter; the plugin then includes that file without path validation.
OpenCVE Enrichment
EUVD