Impact
The WPCasa plugin for WordPress contains a code injection flaw caused by inadequate validation of the parameters processed by the 'api_requests' function. This flaw allows an attacker with no authentication to invoke arbitrary PHP functions and execute code on the server, leading to full control of the compromised WordPress installation.
Affected Systems
WordPress sites running the WPCasa plugin version 1.4.1 or earlier are affected. The vulnerability applies to all releases up to and including 1.4.1, with no further version information provided in the CVE record.
Risk and Exploitability
The CVSS score of 9.8 marks this as a critical issue, while the EPSS score of less than 1% indicates that the likelihood of exploitation is currently low. It is not listed as a known exploited vulnerability in the CISA KEV catalog. The attack vector is inferred to be a publicly accessible API endpoint exposed by the plugin, where unauthenticated users can craft requests that trigger the injection. An attacker would typically send a request to the plugin’s API URL with malicious parameters to execute arbitrary PHP functions.
OpenCVE Enrichment
EUVD