Exposure of Sensitive Information to an Unauthorized Actor vulnerability in HitPay Payment Solutions Pte Ltd HitPay Payment Gateway for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects HitPay Payment Gateway for WooCommerce: from n/a through 4.1.3.
History

Tue, 13 Aug 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Hitpay
Hitpay payment Gateway For Woocommerce
CPEs cpe:2.3:a:hitpay:payment_gateway_for_woocommerce:*:*:*:*:*:*:*:*
Vendors & Products Hitpay
Hitpay payment Gateway For Woocommerce
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 10:45:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive Information to an Unauthorized Actor vulnerability in HitPay Payment Solutions Pte Ltd HitPay Payment Gateway for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects HitPay Payment Gateway for WooCommerce: from n/a through 4.1.3.
Title WordPress HitPay Payment Gateway for WooCommerce plugin <= 4.1.3 - Sensitive Data Exposure via Log File vulnerability
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published: 2024-08-13T10:20:14.837Z

Updated: 2024-08-13T13:27:31.701Z

Reserved: 2024-06-19T11:16:57.418Z

Link: CVE-2024-38747

cve-icon Vulnrichment

Updated: 2024-08-13T13:27:20.878Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-13T11:15:15.967

Modified: 2024-08-13T12:58:25.437

Link: CVE-2024-38747

cve-icon Redhat

No data.