Impact
A Cross‑Site Request Forgery vulnerability exists in the emendo_seb Co‑marquage service‑public.fr WordPress plugin. The flaw allows an attacker to trick a logged‑in user into submitting a crafted request that performs an action through the plugin, potentially changing configuration or data. The weakness aligns with CWE‑352, indicating missing protection against forged requests.
Affected Systems
Emendo Seb Co‑marquage service‑public.fr WordPress plugin, any release up to and including version 0.5.77, is affected. No newer version information is provided in the data.
Risk and Exploitability
The CVSS score of 4.3 defines a medium impact. The EPSS score of less than 1% suggests a low probability that this vulnerability has been actively exploited. The vulnerability is not listed in the CISA KEV catalog. Likely attack involves a malicious website or email that submits a forged request to the plugin while a user is authenticated; the attacker is inferred to need a valid session token to succeed.
OpenCVE Enrichment