Impact
The Leadinfo WordPress plugin contains a missing authorization flaw that permits unauthorized users to modify its settings. This improper access control issue, classified as CWE-862, allows an attacker to change configuration values that could alter website behaviour or compromise sensitive data. The vulnerability is present in all releases from the earliest through version 1.1.
Affected Systems
Systems using the Leadinfo WordPress plugin with version 1.1 or earlier are affected. The plugin is typically installed on WordPress sites. Any site that has not applied newer releases is susceptible.
Risk and Exploitability
With a CVSS score of 6.5, the risk is moderate, yet the EPSS score is under 1 %, indicating a low probability of active exploitation. The vulnerability is not listed in CISA’s KEV catalog, suggesting no publicly known attacks. Based on the description, the likely attack vector is through the WordPress administration interface or by sending crafted requests to the plugin’s settings endpoint, assuming they can authenticate or otherwise bypass the access control checks.
OpenCVE Enrichment
EUVD