Impact
A Cross‑Site Request Forgery vulnerability is reported in the tryinteract Interact: Embed A Quiz On Your Site plugin. The flaw, identified as CWE‑352, exists in all releases up to and including version 3.1. A malicious actor can send forged requests to the WordPress site from the context of an authenticated user, although the CVE does not specify the exact actions that can be performed.
Affected Systems
Any WordPress site that has the Interact: Embed A Quiz On Your Site plugin installed in a version from the earliest release through 3.1 is affected. No other components of the WordPress installation are noted as impacted.
Risk and Exploitability
The CVSS score of 4.3 indicates moderate severity, while the EPSS score of < 1 % suggests a very low probability of exploitation in the wild. The issue is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is through a web‑based request that an attacker can forge to a vulnerable WordPress site, potentially exploiting the lack of proper request authentication or token validation. The vulnerability allows an attacker to affect the site, but the specific impact is not detailed in the advisory.
OpenCVE Enrichment
EUVD