Impact
The flaw allows an attacker to traverse the filesystem and delete files from within the WordPress installation. This executes a path traversal attack that can remove critical data, configuration files, or service components, thereby disrupting website availability. It is a classic CWE‑22 weakness.
Affected Systems
The vulnerability affects the WordPress plugin YML for Yandex Market published by icopydoc. All releases prior to version 5.3.0 are susceptible; versions 5.3.0 and later include the fix.
Risk and Exploitability
The CVSS score of 6.8 denotes moderate severity. No EPSS score is reported, and the issue is not listed in CISA's Known Exploited Vulnerabilities catalog. The attack is likely to be carried out through the plugin’s interface, with a remote user crafting a path traversal payload.
OpenCVE Enrichment