Impact
The NitroPack plugin for WordPress contains a missing authorization check that permits any web visitor to access privileged configuration functions. This broken access control flaw allows an attacker to read or alter plugin settings, potentially degrading site performance or enabling further attacks. The weakness is classified as CWE-862.
Affected Systems
WordPress installations running NitroPack versions up to and including 1.19.3 are affected. All releases from the first available version through 1.19.3 lack the necessary protections. The vulnerability is tied solely to the NitroPack plugin and does not extend beyond it.
Risk and Exploitability
The vulnerability carries a score of 5.3, indicating moderate severity. Exploitation is considered unlikely, with an exploitation probability below 1%, and it is not currently listed in the CISA KEV catalog. The flaw can be reached remotely by sending HTTP requests to NitroPack endpoints that omit authentication checks, requiring no special credentials or additional software.
OpenCVE Enrichment