CVE-2024-0872

The Watu Quiz plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.4.1 via the watu-userinfo shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to extract sensitive user meta data which can include session tokens and user emails.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kibokolabs:watu_quiz:*:*:*:*:*:wordpress:*:*

History

07 Apr 2025, 13:51

Type Values Removed Values Added
First Time Kibokolabs
Kibokolabs watu Quiz
References () https://plugins.trac.wordpress.org/changeset/3036986/ - () https://plugins.trac.wordpress.org/changeset/3036986/ - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/acc261eb-fafa-4e9d-b7ab-a449f14a7638?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/acc261eb-fafa-4e9d-b7ab-a449f14a7638?source=cve - Third Party Advisory
CPE cpe:2.3:a:kibokolabs:watu_quiz:*:*:*:*:*:wordpress:*:*

26 Feb 2025, 19:15

Type Values Removed Values Added
CWE CWE-639

Information

Published : 2024-04-09 19:15

Updated : 2025-04-07 13:51


NVD link : CVE-2024-0872

Mitre link : CVE-2024-0872

CVE.ORG link : CVE-2024-0872


JSON object : View

Products Affected

kibokolabs

  • watu_quiz
CWE
CWE-639

Authorization Bypass Through User-Controlled Key