Impact
Cross‑Site Request Forgery (CSRF) allows an attacker to store malicious JavaScript on a WordPress site that uses the WP sIFR plugin. Once an authenticated user visits a page or posts content, the injected script executes in that visitor’s browser, compromising the confidentiality, integrity, and availability of the site and potentially hijacking user sessions. The vulnerability is classified as CWE‑352.
Affected Systems
WordPress sites running the WP sIFR plugin version 0.6.8.1 or earlier are affected. The vulnerability applies to all earlier releases, as no lower version boundary is specified.
Risk and Exploitability
The CVSS score of 7.1 indicates a high severity. With an EPSS score of less than 1 %, the likelihood of exploitation is low, and the issue is not listed in CISA’s KEV catalog. The CSRF flaw most likely requires the victim to be a logged‑in user who is induced to visit a crafted URL or submit a forged request, thereby exercising the vulnerability and triggering the stored cross‑site scripting.
OpenCVE Enrichment