The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.6.2 via API. This makes it possible for unauthenticated attackers to obtain post titles, slugs, IDs, content and other metadata including passwords of password-protected posts and pages.
References
Configurations
History
27 Jan 2025, 17:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wpchill:passster:*:*:*:*:*:wordpress:*:* | |
CWE | NVD-CWE-noinfo | |
First Time |
Wpchill
Wpchill passster |
|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3032195%40content-protector%2Ftrunk&old=3020439%40content-protector%2Ftrunk&sfp_email=&sfph_mail=#file3 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/00b81467-8d00-4816-895a-89d67c541c17?source=cve - Third Party Advisory |
Information
Published : 2024-02-29 01:43
Updated : 2025-01-27 17:30
NVD link : CVE-2024-0616
Mitre link : CVE-2024-0616
CVE.ORG link : CVE-2024-0616
JSON object : View
Products Affected
wpchill
- passster
CWE