Impact
The WordPress Single Sign-On (SSO) plugin contains a misconfigured capability check on a function, allowing unauthenticated callers to read data that should be restricted to certain roles. The flaw enables attackers to harvest sensitive site content, including pages, posts, or other protected resources, leading to a breach of confidentiality. This weakness maps to the Authorization error category described by CWE‑863.
Affected Systems
The affected component is the WordPress Single Sign-On (SSO) plugin by cyberlord92, in all editions (All‑Inclusive, Enterprise, Premium, Standard) for both single‑site and multisite configurations. Versions up through and including 5.3 are impacted; any deployment on these releases is vulnerable unless already upgraded beyond that series.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate threat, while the EPSS score of less than 1% suggests a low likelihood of active exploitation. The flaw is not listed in CISA’s KEV catalog. The likely attack vector is a simple HTTP request against the plugin’s exposed function, which does not perform proper capability checks, and does not require authentication. An attacker can send crafted URLs or form submissions to retrieve the hidden content, provided the site’s public web interface is reachable.
OpenCVE Enrichment
EUVD