The Attesa Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.4.2 via the 'attesa-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
Metrics
Affected Vendors & Products
References
History
Mon, 11 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 09 Nov 2024 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Attesa Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.4.2 via the 'attesa-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to. | |
Title | Attesa Extra <= 1.4.2 - Authenticated (Contributor+) Post Disclosure | |
Weaknesses | CWE-639 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-09T06:41:30.876Z
Updated: 2024-11-11T11:55:17.825Z
Reserved: 2024-11-01T15:13:22.898Z
Link: CVE-2024-10688
Vulnrichment
Updated: 2024-11-11T11:55:04.611Z
NVD
Status : Awaiting Analysis
Published: 2024-11-09T07:15:05.720
Modified: 2024-11-12T13:56:24.513
Link: CVE-2024-10688
Redhat
No data.