Impact
Helmut Wandl Advanced Settings plugin versions 3.1.1 and earlier contain a Cross‑Site Request Forgery vulnerability (CWE‑352). The flaw permits an attacker to trick a logged‑in WordPress user into submitting unwanted requests that alter plugin settings or trigger other privileged actions. While the description does not detail the exact payload, such a flaw can lead to unintended configuration changes, potential privilege escalation, and a compromise of the site’s integrity.
Affected Systems
WordPress sites that have the Helmut Wandl Advanced Settings plugin installed with a version of 3.1.1 or earlier are affected. Administrators, editors, or any user with sufficient privileges who could be led to visit a crafted URL could be exploited.
Risk and Exploitability
The CVSS score of 4.3 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of widespread exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. Credentialed attackers can trigger the flaw by having a victim user supply a malicious link. Because the exploitation requires an authenticated and potentially active session, the attack surface is limited but still significant for sites that rely on this plugin for configuration.
OpenCVE Enrichment
EUVD