This vulnerability is moderately dangerous and expected to become exploited. Vulnerabilities like this one are used in mass-exploit campaigns. Attackers use these to attack thousands of websites at a time, regardless of traffic size or popularity. Learn more.
As immediate action, update the affected plugin. If you're unable to do so, ask your hosting provider or web developer for help.
Note! It works only when debug.log is turned on. The severity score (CVSS 3.1 base score) is calculated by keeping in mind the CVSS 3.1 user guide paragraph 2.3.3 - "If a specific configuration is required for an attack to succeed, the vulnerable component should be scored assuming it is in that configuration, providing it is a reasonable configuration."
This could allow a malicious actor to view sensitive information that is normally not available to regular users. This can be used to exploit other weaknesses in the system.
CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.
We advise to mitigate or resolve the vulnerability immediately.
Patchstack has issued a mitigation rule to block any attacks until you have updated to a patched version.
Update to version 7.2.1 or later to resolve the vulnerability. Patchstack users can turn on auto-update for vulnerable plugins only.
16 Aug, 2023