Description
The CGC Maintenance Mode plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2 via the REST API. This makes it possible for unauthenticated attackers to view protected posts via REST API even when maintenance mode is enabled.
Published: 2024-04-04
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-17172 The CGC Maintenance Mode plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2 via the REST API. This makes it possible for unauthenticated attackers to view protected posts via REST API even when maintenance mode is enabled.
History

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Title CGC Maintenance Mode <= 1.2 - Sensitive Information Exposure
Weaknesses CWE-284

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:40:29.129Z

Reserved: 2024-02-09T19:06:11.501Z

Link: CVE-2024-1418

cve-icon Vulnrichment

Updated: 2024-08-01T18:40:20.935Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-04T06:15:08.783

Modified: 2026-04-08T17:18:20.163

Link: CVE-2024-1418

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:16:24Z

Weaknesses