No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-34012 | The Simple Restrict plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.7 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator. |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 10 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpchill
Wpchill simple Restrict |
|
| CPEs | cpe:2.3:a:wpchill:simple_restrict:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wpchill
Wpchill simple Restrict |
|
| Metrics |
ssvc
|
Tue, 10 Dec 2024 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Simple Restrict plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.7 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator. | |
| Title | Simple Restrict <= 1.2.7 - Unauthenticated Content Restriction Bypass to Sensitive Information Exposure | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:18:34.608Z
Reserved: 2024-11-11T21:17:39.972Z
Link: CVE-2024-11106
Updated: 2024-12-10T15:04:47.884Z
Status : Received
Published: 2024-12-10T11:15:07.030
Modified: 2024-12-10T11:15:07.030
Link: CVE-2024-11106
No data.
OpenCVE Enrichment
No data.
EUVD