Impact
The vulnerability is a Server‑Side Request Forgery that allows an attacker to command the vulnerable QuantumCloud SEO Help WordPress plugin to issue HTTP requests to arbitrary URLs. This flaw can lead to the exposure of internal network resources or sensitive data, creating confidentiality and integrity risks and providing a foothold for additional attacks.
Affected Systems
All installations of the QuantumCloud SEO Help WordPress plugin with versions up to and including 6.7.9 are affected. The vulnerability is present on any WordPress site that has the plugin installed and activated.
Risk and Exploitability
The CVSS score of 6.8 indicates moderate severity. The EPSS score of < 1% suggests a low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through the plugin’s exposed API or configuration endpoints, which an attacker can target by submitting crafted URL parameters or form inputs. Exploitation conditions appear to require remote access to the website’s visitor‑facing interface, making the vulnerability remotely exploitable under typical WordPress deployment scenarios.
OpenCVE Enrichment
EUVD