Impact
The plugin suffers from a missing authorization check that allows users to bypass normal access control settings. This flaw can enable an attacker to view or modify avatar listings or possibly interact with the underlying data structures that the plugin manages, compromising the confidentiality and integrity of user avatar information.
Affected Systems
The vulnerability affects the WordPress Author Avatars List/Block plugin released by Paul Bearne. Any installation using version 2.1.25 or earlier is impacted.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate risk level, but the EPSS score of less than 1% suggests that exploitation is currently unlikely. The flaw is not listed in the CISA Known Exploited Vulnerabilities catalog. It is inferred that the attack vector is via unauthenticated or insufficiently privileged web requests to the WordPress site hosting the plugin, as the vulnerability arises from incorrect access control configuration.
OpenCVE Enrichment