Impact
The vulnerability located in Designinvento DirectoryPress plugin versions up to 3.6.26 allows the exposure of sensitive system information to an unauthorized control sphere. An attacker can retrieve embedded sensitive data through the plugin, potentially compromising the confidentiality of the site’s configuration or user data. The weakness is associated with CWE-497, describing information leakage.
Affected Systems
Affected are installations of the Designinvento DirectoryPress WordPress plugin ranging from the earliest available build through version 3.6.26. Any site that has not upgraded the plugin beyond this version and still uses it is at risk.
Risk and Exploitability
The CVSS score of 4.3 indicates a moderate impact on confidentiality, and the EPSS score of less than 1% suggests a low probability of public exploitation at the present. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector involves sending a crafted request to a DirectoryPress endpoint or accessing the plugin’s administrative interface without authentication, thereby triggering the disclosure of sensitive data. While exploitation may be straightforward, the absence of a high exploit likelihood reduces immediate urgency, yet action remains recommended to prevent potential data breaches.
OpenCVE Enrichment