While this vulnerability can be initiated by the role shown in "Required Privilege", successful exploitation requires a privileged user to perform an action — such as clicking a malicious link, visiting a crafted page, or submitting a form.
This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication.
CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.
This security issue has a low severity impact and is unlikely to be exploited.
Update to version 3.2.12 or later to resolve the vulnerability. Patchstack users can turn on auto-update for vulnerable plugins only.
3 Apr, 2024
Early warning sent out to Patchstack customers
9 May, 2024
Published by Patchstack
9 May, 2024