The Simple Restrict plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.7 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wpchill
Wpchill simple Restrict |
|
CPEs | cpe:2.3:a:wpchill:simple_restrict:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wpchill
Wpchill simple Restrict |
|
Metrics |
ssvc
|
Tue, 10 Dec 2024 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Simple Restrict plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.7 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator. | |
Title | Simple Restrict <= 1.2.7 - Unauthenticated Content Restriction Bypass to Sensitive Information Exposure | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-12-10T11:09:11.914Z
Updated: 2024-12-10T15:04:53.904Z
Reserved: 2024-11-11T21:17:39.972Z
Link: CVE-2024-11106
Vulnrichment
Updated: 2024-12-10T15:04:47.884Z
NVD
Status : Received
Published: 2024-12-10T11:15:07.030
Modified: 2024-12-10T11:15:07.030
Link: CVE-2024-11106
Redhat
No data.