Impact
A Cross‑Site Request Forgery vulnerability in the AR For WordPress plugin allows an attacker to upload a web shell to the web server, effectively providing remote code execution capability. The weakness is identified as CWE‑352 and is present in all releases of the plugin up to version 8.34.
Affected Systems
The vulnerability affects the webandprint AR For WordPress plugin for WordPress sites. All installed versions from the earliest releases through 8.34 are vulnerable, regardless of WordPress version.
Risk and Exploitability
The vulnerability carries a CVSS score of 9.6, indicating a high severity level. The EPSS score of less than 1 % suggests the likelihood of exploitation is currently low, but the attack risks are severe. The CMS is not listed in the CISA KEV catalog. The likely attack path involves a user authenticated to the WordPress dashboard being tricked into loading a crafted request that triggers the upload function, which then stores a malicious file on the server. Successful exploitation would enable an attacker to execute arbitrary code on the host.
OpenCVE Enrichment
EUVD