While this vulnerability can be initiated by the role shown in "Required Privilege", successful exploitation requires a privileged user to perform an action — such as clicking a malicious link, visiting a crafted page, or submitting a form.
This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.
CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.
This security issue has a low severity impact and is unlikely to be exploited.
Patchstack has issued a mitigation rule to block any attacks until you have updated to a fixed version.
Update to version 1.3.1 or later to resolve the vulnerability.
29 Mar, 2024
Early warning sent out to Patchstack customers
7 May, 2024
Published by Patchstack
7 May, 2024