Impact
This vulnerability is a Missing Authorization flaw (CWE-862) that allows unauthenticated users to access privileged plugin functionality. The affected WordPress plugin, Simple Sitemap – Create a Responsive HTML Sitemap, does not enforce proper access checks, enabling attackers to view or manipulate sitemap data. The impact can range from exposing site structure to potential manipulation of SEO components, compromising confidentiality and integrity of site metadata.
Affected Systems
The issue affects the WordPress plugin Simple Sitemap – Create a Responsive HTML Sitemap, version 3.6.0 and earlier, released by David Gwyer. It runs on WordPress installations with the free plugin version, as identified by CPE cpe:2.3:a:wpgoplugins:simple_sitemap:*:*:*:*:free:wordpress:*:*.
Risk and Exploitability
The CVSS score of 4.3 indicates low severity, and the EPSS score of <1% suggests a small likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers could exploit the flaw via the plugin's exposed endpoints, assuming the site allows direct access to the plugin URLs. No authentication is required, so the attack vector is likely web-based. The low CVSS reflects that the plugin does not handle highly sensitive data, but organizations should still remediate to prevent potential misuse.
OpenCVE Enrichment
EUVD