The Watu Quiz plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.4.1 via the watu-userinfo shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to extract sensitive user meta data which can include session tokens and user emails.
References
Configurations
History
07 Apr 2025, 13:51
Type | Values Removed | Values Added |
---|---|---|
First Time |
Kibokolabs
Kibokolabs watu Quiz |
|
References | () https://plugins.trac.wordpress.org/changeset/3036986/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/acc261eb-fafa-4e9d-b7ab-a449f14a7638?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:kibokolabs:watu_quiz:*:*:*:*:*:wordpress:*:* |
26 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-639 |
Information
Published : 2024-04-09 19:15
Updated : 2025-04-07 13:51
NVD link : CVE-2024-0872
Mitre link : CVE-2024-0872
CVE.ORG link : CVE-2024-0872
JSON object : View
Products Affected
kibokolabs
- watu_quiz
CWE
CWE-639
Authorization Bypass Through User-Controlled Key