Impact
The Easy Replace Image plugin for WordPress fails to enforce authorization on the image_replacement_from_url function, which is bound to the eri_from_url AJAX action. This flaw permits any authenticated user with Contributor-level access or higher to upload arbitrary external images and replace existing attachments on the site. The consequence is potential defacement, phishing, or content manipulation, compromising the site’s integrity.
Affected Systems
WordPress installations running Easy Replace Image up to version 3.5.2 are affected. The issue is present in all releases up to and including 3.5.2; later releases contain the fix.
Risk and Exploitability
With a CVSS score of 4.3 the vulnerability is considered moderate. The EPSS score is less than 1%, indicating a very low current exploitation probability, and the issue is not listed in the CISA KEV catalog. An attacker must first authenticate to the site as a Contributor or higher user, then use the exposed AJAX endpoint to trigger the replacement. No additional privileges are required beyond the granted contributor rights.
OpenCVE Enrichment