Impact
The vulnerability allows an authenticated user with Administrator privileges to craft a URL in the Post Affiliate Pro "URL" field that the plugin will request on the server’s behalf. The returned content can then be read by the attacker, effectively giving the ability to perform arbitrary outbound HTTP/HTTPS requests from the web server and retrieve response data. This can expose internal resources, leak sensitive information, or serve as a foothold for further attacks.
Affected Systems
Vendor JurajSim Product Post Affiliate Pro plugin for WordPress All versions up to and including 1.28.0 are affected.
Risk and Exploitability
The CVSS rating of 3.8 indicates low severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. The flaw requires Administrator access within the same WordPress installation, limiting the scope to compromised admin accounts. The vulnerability is not listed in CISA’s KEV catalog, and no publicly available exploit is widely disseminated.
OpenCVE Enrichment