Impact
The vulnerability in WP Chill Revive.so allows an attacker to bypass normal authorization checks and invoke plugin functionalities without proper permissions. The description indicates that incorrectly configured access‑control security levels can be exploited. Based on the description, it is inferred that unauthorized users may gain privileged actions such as modifying settings or accessing sensitive data. This type of flaw is classified under CWE-862 (Missing Authorization).
Affected Systems
Any WordPress site that has installed Revive.so plugin version 2.0.6 or earlier is affected. The plugin is developed by WP Chill and is widely used for site analytics and engagement features. Sites that rely on Revive.so for critical functionality should verify the installed version against the impacted set.
Risk and Exploitability
Based on the description, it is inferred that the plugin exposes endpoints via the WordPress HTTP interface, so an attacker could craft an HTTP request to trigger the privileged action if the site’s access control is misconfigured. Successful exploitation would likely require that the attacker can reach the plugin’s administrative interface, either as an authenticated user or via a session that is not properly restricted. The CVSS score of 4.3 indicates a low severity, and the EPSS score of less than 1% suggests that exploitation is unlikely to be widespread at the current time. The vulnerability is not listed in CISA KEV, further indicating limited public exploitation. Overall the risk is low, but remediation should be undertaken promptly to prevent potential unauthorized use.
OpenCVE Enrichment
EUVD