Impact
The WordPress WP Last Modified Info plugin has an Improper Control of Generation of Code (Code Injection) flaw that allows attackers to execute arbitrary PHP code on the host. This vulnerability can be triggered by sending malicious data that the plugin processes, leading to full remote code execution. The weakness is identified as CWE‑94.
Affected Systems
The issue affects the WordPress plugin WP Last Modified Info developed by Sayan Datta, versions up to and including 1.9.4. Any site running this plugin without an updated version is vulnerable.
Risk and Exploitability
The CVSS score of 7.4 indicates a high severity. The EPSS score is reported as < 1 %, implying a very low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Attackers could most likely exploit this flaw remotely from any network level that can reach the WordPress control surface, potentially without needing authentication, as the description indicates remote code inclusion. Based on the description, it is inferred that the exploit can be performed via the WordPress admin interface or an API endpoint that accepts code injection.
OpenCVE Enrichment