Impact
The vulnerability is caused by unsanitized handling of filenames used in PHP include/require statements. An attacker can supply a crafted path and cause the plugin to include arbitrary files from the server. This can lead to disclosure of sensitive files or execution of malicious code, giving an attacker full control over the WordPress site.
Affected Systems
The affected product is the Xylus Themes WP Smart Import plugin version 1.1.3 and all earlier releases. Any WordPress site that has a vulnerable instance of this plugin installed is at risk.
Risk and Exploitability
The CVSS score of 8.1 indicates a high severity. Current EPSS is less than 1 percent, suggesting exploitation is unlikely at present. The vulnerability is not listed in CISA’s KEV catalog. Because the flaw is a local file inclusion, the most likely attack vector is through a crafted request to the plugin’s functions – the exact authentication requirements are not detailed in the provided data, so the risk spans all users who can access the plugin’s input parameters.
OpenCVE Enrichment
EUVD