Impact
The Listly: Listicles For WordPress plugin contains a missing capability check in its Init() function, allowing an unauthenticated user to execute code that deletes arbitrary transient values stored in the WordPress database. This missing authorization flaw (CWE-862) means any visitor could cause loss of cached or configuration data, potentially disrupting site functionality or user experience.
Affected Systems
This issue affects the Listly plugin developed by milanmk, specifically all releases up to and including version 2.7. WordPress site owners running these plugin versions are vulnerable until they upgrade past 2.7.
Risk and Exploitability
The CVSS score of 5.3 classifies the vulnerability as moderate, and the EPSS score of less than 1% indicates a very low probability of active exploitation at present. The vulnerability is not listed in the CISA KEV catalog, suggesting limited exploitation prevalence. Based on the description, it is inferred that an attacker can trigger the deletion through an unauthenticated HTTP request to the plugin's Init() endpoint, allowing a remote attacker to act from anywhere an exposed WordPress instance is reachable.
OpenCVE Enrichment
EUVD