The Simple Restrict plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.7 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
History

Tue, 10 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Wpchill
Wpchill simple Restrict
CPEs cpe:2.3:a:wpchill:simple_restrict:*:*:*:*:*:*:*:*
Vendors & Products Wpchill
Wpchill simple Restrict
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Dec 2024 11:15:00 +0000

Type Values Removed Values Added
Description The Simple Restrict plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.7 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
Title Simple Restrict <= 1.2.7 - Unauthenticated Content Restriction Bypass to Sensitive Information Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-12-10T11:09:11.914Z

Updated: 2024-12-10T15:04:53.904Z

Reserved: 2024-11-11T21:17:39.972Z

Link: CVE-2024-11106

cve-icon Vulnrichment

Updated: 2024-12-10T15:04:47.884Z

cve-icon NVD

Status : Received

Published: 2024-12-10T11:15:07.030

Modified: 2024-12-10T11:15:07.030

Link: CVE-2024-11106

cve-icon Redhat

No data.