Impact
The vulnerability is a Cross‑Site Request Forgery flaw in the WordPress Table Block by RioVizual plugin. It enables an attacker to force a logged‑in user to execute unintended actions, potentially modifying or deleting table data. The weakness originates from inadequate verification of requests and corresponds to CWE‑352.
Affected Systems
Affected are WordPress installations with the Table Block by RioVizual plugin version 2.3.1 or earlier. No specific WordPress core version is mentioned, and the problem affects all users who have this plugin installed.
Risk and Exploitability
The CVSS score is 4.3, indicating low to moderate severity. EPSS is less than 1%, implying a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers would need a victim user to visit a crafted site or template that includes the malicious request, and this is inferred from the description as the attack vector. Because no explicit attacker‑controlled vector is disclosed, the exploitation probability remains low.
OpenCVE Enrichment
EUVD