The Seriously Simple Podcasting WordPress plugin before 3.0.0 discloses the Podcast owner's email address (which by default is the admin email address) via an unauthenticated crafted request.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/061c59d6-f4a0-4cd1-b945-5e92b9c2b4aa/ | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/061c59d6-f4a0-4cd1-b945-5e92b9c2b4aa/ | Exploit Third Party Advisory |
Configurations
History
01 May 2025, 00:09
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:a:castos:seriously_simple_podcasting:*:*:*:*:*:wordpress:*:* | |
| References | () https://wpscan.com/vulnerability/061c59d6-f4a0-4cd1-b945-5e92b9c2b4aa/ - Exploit, Third Party Advisory | |
| First Time |
Castos
Castos seriously Simple Podcasting |
Information
Published : 2024-03-11 18:15
Updated : 2025-05-01 00:09
NVD link : CVE-2023-6444
Mitre link : CVE-2023-6444
CVE.ORG link : CVE-2023-6444
JSON object : View
Products Affected
castos
- seriously_simple_podcasting
CWE
