Impact
A missing authorization check in the Agile Logix Post Timeline plugin allows attackers to bypass configured access control levels. The vulnerability makes it possible to access or alter post‑timeline data that should be restricted, potentially exposing sensitive content or changing site state without proper privileges. The weakness corresponds to CWE‑862, indicating a direct flaw in access control enforcement.
Affected Systems
The affected product is the Agile Logix “Post Timeline” WordPress plugin. All releases from the earliest noted versions up through 2.4.1 are impacted; any installation using a version equal to or older than 2.4.1 is vulnerable.
Risk and Exploitability
The CVSS score is 5.3, indicating a moderate severity. The EPSS score is less than 1 %, suggesting a low likelihood of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Based on the description it is inferred that the attack vector requires in‑application access; an attacker with the ability to send crafted requests to the plugin endpoints could potentially exploit the missing access control to read or modify posts. Precise exploitation prerequisites are not detailed in the data.
OpenCVE Enrichment