Exposure of Sensitive Information to an Unauthorized Actor vulnerability in MBE Worldwide S.P.A. MBE eShip allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects MBE eShip: from n/a through 2.1.2.
History

Tue, 13 Aug 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 10:30:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive Information to an Unauthorized Actor vulnerability in MBE Worldwide S.P.A. MBE eShip allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects MBE eShip: from n/a through 2.1.2.
Title WordPress MBE eShip plugin <= 2.1.2 - Sensitive Data Exposure vulnerability
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published: 2024-08-13T10:18:17.565Z

Updated: 2024-08-13T15:57:53.634Z

Reserved: 2024-06-19T11:16:57.418Z

Link: CVE-2024-38742

cve-icon Vulnrichment

Updated: 2024-08-13T15:57:32.932Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-13T11:15:15.737

Modified: 2024-08-13T12:58:25.437

Link: CVE-2024-38742

cve-icon Redhat

No data.