Impact
The Quick Playground WordPress plugin fails to validate the user-supplied "stylesheet" parameter in the qckply_zip_theme() function. The absence of sanitization allows a crafted value to be appended to the theme root path and included in a dynamically generated ZIP archive. An unauthenticated attacker can request this API endpoint with an attacker-specified "stylesheet" value, causing the plugin to create a ZIP package that may contain any file on the server, including sensitive configuration files such as wp-config.
Affected Systems
WordPress sites that have the Quick Playground plugin by davidfcarr installed with any release up to and including version 1.3.3 are affected. The vulnerability is isolated to this plugin and applies only to those instances that have not been updated beyond the mentioned version threshold.
Risk and Exploitability
The flaw carries a CVSS score of 7.5, indicating high severity. No EPSS score is publicly available and the issue is not listed in the CISA KEV catalog. Because the attack vector requires only an unauthenticated HTTP request to the plugin's API endpoint and no additional prerequisites, exploitation is straightforward and currently possible.
OpenCVE Enrichment