Impact
An unauthenticated user can trigger the bulk download feature of the PeproDev Ultimate Invoice WordPress plugin (versions up to 2.2.5) to produce ZIP archives of exported invoice PDFs. The archives are named predictably, enabling brute‑force enumeration of the ZIP files and the retrieval of personally identifiable information, including financial details. This results in a disclosure of sensitive data, compromising confidentiality.
Affected Systems
The vulnerability affects the PeproDev Ultimate Invoice WordPress plugin on WordPress sites, specifically all releases up to and including version 2.2.5. Sites running any of those plugin versions are susceptible to unauthenticated archive download.
Risk and Exploitability
The CVSS score of 5.3 indicates medium severity. The EPSS score of less than 1 % suggests a low likelihood of exploitation in the wild, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires no credentials; an attacker only needs to send HTTP requests to the bulk‑download endpoint and systematically try the predictable ZIP names. Successful enumeration would expose a large volume of PII. While the immediate risk to a single site may be modest, the potential for mass data leakage makes this a significant concern for administrators.
OpenCVE Enrichment