Impact
Based on the description, it is inferred that the vulnerability is a classic CSRF flaw in the PDF Thumbnail Generator plugin for WordPress. An attacker can craft a malicious web page or link that, when visited by a logged‑in user, causes the plugin to perform a thumbnail generation request without the user’s explicit consent. This can lead to unauthorized resource processing or the creation of thumbnails from files that the user has not intended to share, potentially exposing sensitive information or consuming server resources.
Affected Systems
Based on the description, it is inferred that all installations of kubiq PDF Thumbnail Generator up to and including version 1.4 are vulnerable. The affected product is the WordPress plugin “PDF Thumbnail Generator” distributed by kubiq, which may appear on any WordPress site that has installed a version through 1.4. The vulnerability affects all WordPress users who are authenticated and can access the plugin’s thumbnail generation endpoint.
Risk and Exploitability
Based on the description, it is inferred that the attack vector is a victim visiting a crafted page that initiates an HTTP request to the plugin’s endpoint; the attacker does not need any direct network access to the target beyond the ability to embed malicious content. The CVSS score of 4.3 indicates moderate severity; the EPSS score of less than 1% indicates that, historically, exploit attempts are rare. The vulnerability is not listed in the CISA KEV catalog. The attacker benefits from the victim’s authenticated session, and the impact is limited to the actions that the compromised user is permitted to perform through the plugin’s interface.
OpenCVE Enrichment