Impact
An attacker can retrieve sensitive system information embedded within the Webpushr plugin. The vulnerability allows unauthorized access to data that should be protected, compromising the confidentiality of the application and potentially exposing credentials or configuration details. Based on the description, it is inferred that the attack vector is via a publicly accessible or poorly protected plugin interface, as the issue describes “Retrieve Embedded Sensitive Data”.
Affected Systems
WordPress sites that have installed the Webpushr Webpushr webpushr-web-push-notifications plugin version 4.38.0 or earlier are affected. The vulnerability applies to all installations of this plugin where the embedded sensitive data is present.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, reflecting the impact on confidentiality. The EPSS score of less than 1% suggests a low exploitation probability at present, and the vulnerability is not listed in the CISA KEV catalog. However, should the plugin or its administrative pages be exposed to external actors, an attacker could exploit this flaw to obtain sensitive information, especially if the site does not enforce strict access controls or SSL/TLS.
OpenCVE Enrichment