Vulnerabilities like this one are used in mass-exploit campaigns. Attackers use these to attack thousands of websites at a time, regardless of traffic size or popularity. Learn more.
As immediate action, update the affected plugin. If you're unable to do so, ask your hosting provider or web developer for help.
A vulnerability was discovered during a planned security audit.
While this vulnerability can be initiated by the role shown in "Required Privilege", successful exploitation requires a privileged user to perform an action — such as clicking a malicious link, visiting a crafted page, or submitting a form.
This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication.
CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.
This security issue has a low severity impact and is unlikely to be exploited.
Update to version 6.3.2 or later to resolve the vulnerability. Patchstack users can turn on auto-update for vulnerable plugins only.
NaN undefined, NaN