Impact
The vulnerability allows authenticated administrators to cause the plugin to deserialize untrusted \'posttypes\' input, creating a PHP Object Injection vector. While the plugin itself contains no known exploitation chain, the ability to inject arbitrary objects opens the door for more destructive actions when combined with a POP chain from other plugins or themes. Attackers could delete files, read sensitive data, or execute code if such a chain is present.
Affected Systems
The flaw affects the WordPress plugin \'Glossary by WPPedia – Best Glossary plugin for WordPress\' versions up to 1.3.0. Users running any of those releases on a WordPress site with an administrator or higher role are potentially exposed.
Risk and Exploitability
The CVSS score of 7.2 indicates a high severity, while the EPSS score of 1% points to a low but non‑zero likelihood of exploitation. The vulnerability requires administrative access and a pre‑existing PHP object injection chain from another component; consequently, the actual risk is moderate. The vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment
EUVD