Impact
The vulnerability lies in a WordPress plugin that lets administrators switch the WordPress core version. An attacker can submit a crafted HTTP request that the plugin processes without verifying the origin, allowing the non‑authenticated website to perform a version downgrade or upgrade. This can lead to exposure of security holes, configuration drift, or execution of unfiltered code if an older, vulnerable WordPress release is chosen. The weakness is a classic CSRF flaw (CWE‑352).
Affected Systems
The issue affects the RIS Version Switcher – Downgrade or Upgrade WP Versions Easily plugin developed by Md Taufiqur Rahman. Any WordPress site that has this plugin installed and running any version up to and including 1.0 is affected.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of current exploitation. The vulnerability is not listed in CISA's KEV catalog. An attacker would need to trick a logged‑in user with sufficient privileges into visiting a malicious site that sends a forged request to the plugin’s endpoint; no direct network attack is required. If the victim is an administrator, the crawler can change the core WordPress version and potentially introduce security weaknesses.
OpenCVE Enrichment
EUVD