Exposure of Sensitive Information to an Unauthorized Actor vulnerability in HitPay Payment Solutions Pte Ltd HitPay Payment Gateway for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects HitPay Payment Gateway for WooCommerce: from n/a through 4.1.3.
Metrics
Affected Vendors & Products
References
History
Tue, 13 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Hitpay
Hitpay payment Gateway For Woocommerce |
|
CPEs | cpe:2.3:a:hitpay:payment_gateway_for_woocommerce:*:*:*:*:*:*:*:* | |
Vendors & Products |
Hitpay
Hitpay payment Gateway For Woocommerce |
|
Metrics |
ssvc
|
Tue, 13 Aug 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in HitPay Payment Solutions Pte Ltd HitPay Payment Gateway for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects HitPay Payment Gateway for WooCommerce: from n/a through 4.1.3. | |
Title | WordPress HitPay Payment Gateway for WooCommerce plugin <= 4.1.3 - Sensitive Data Exposure via Log File vulnerability | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Patchstack
Published: 2024-08-13T10:20:14.837Z
Updated: 2024-08-13T13:27:31.701Z
Reserved: 2024-06-19T11:16:57.418Z
Link: CVE-2024-38747
Vulnrichment
Updated: 2024-08-13T13:27:20.878Z
NVD
Status : Awaiting Analysis
Published: 2024-08-13T11:15:15.967
Modified: 2024-08-13T12:58:25.437
Link: CVE-2024-38747
Redhat
No data.