Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in codection Import and export users and customers allows Retrieve Embedded Sensitive Data. This issue affects Import and export users and customers: from n/a through 1.27.12.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-3883 | Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in codection Import and export users and customers allows Retrieve Embedded Sensitive Data. This issue affects Import and export users and customers: from n/a through 1.27.12. |
Fixes
Solution
Update the WordPress Import and export users and customers wordpress plugin to the latest available version (at least 1.27.13).
Workaround
No workaround given by the vendor.
References
History
Mon, 27 Jan 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in codection Import and export users and customers allows Retrieve Embedded Sensitive Data. This issue affects Import and export users and customers: from n/a through 1.27.12. | |
| Title | WordPress Import and export users and customers plugin 1.27.12 - Sensitive Data Exposure vulnerability | |
| Weaknesses | CWE-538 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2025-02-12T20:41:35.095Z
Reserved: 2025-01-23T14:52:14.008Z
Link: CVE-2025-24689
No data.
Status : Received
Published: 2025-01-27T15:15:16.073
Modified: 2025-01-27T15:15:16.073
Link: CVE-2025-24689
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:26:14Z
EUVD