Impact
The vulnerability is an authentication bypass that allows attackers to gain privileged access by using an alternate path or channel within the WordPress Simple Link Directory plugin. The flaw enables authentication abuse, effectively letting an attacker perform any actions granted to an authenticated user. Because of its severe impact, a successful exploitation could result in full site compromise, leakage of sensitive data, and potential deployment of malware. The weakness is an authentication assurance failure, identified as CWE-288.
Affected Systems
Affected systems are WordPress sites that use the quantumcloud Simple Link Directory plugin with a version older than 14.8.1, including all releases up to 14.8.0. Any site that has not applied the 14.8.1 update or later remains vulnerable. No specific operating system or server version restrictions are noted, so the vulnerability persists as long as the older plugin is installed.
Risk and Exploitability
With a CVSS score of 9.8, the vulnerability is classified as critical. The EPSS score of less than 1% indicates a very low current exploitation probability, but the flaw remains exploitable and is not listed in CISA KEV. The CVE indicates that authentication abuse can be achieved via an alternate path or channel within the plugin, allowing attackers to gain privileged access. The specific attack vector, required configuration, or exploitation steps are not detailed in the CVE data, so any further speculation about exploitation methods is inferred but not confirmed. This potential bypass could expose vulnerable installations to unauthorized actions if the plugin is left unpatched.
OpenCVE Enrichment