CVE-2024-0975

The WordPress Access Control plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.0.13 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's "Make Website Members Only" feature (when unset) and view restricted page and post content.
Configurations

Configuration 1 (hide)

cpe:2.3:a:brandonwamboldt:wordpress_access_control:*:*:*:*:*:wordpress:*:*

History

07 Feb 2025, 01:11

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://plugins.trac.wordpress.org/browser/wordpress-access-control/trunk/wordpress-access-control.php#L289 - () https://plugins.trac.wordpress.org/browser/wordpress-access-control/trunk/wordpress-access-control.php#L289 - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/31f13524-2bd7-4157-b378-455ac4f822a1?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/31f13524-2bd7-4157-b378-455ac4f822a1?source=cve - Third Party Advisory
First Time Brandonwamboldt
Brandonwamboldt wordpress Access Control
CPE cpe:2.3:a:brandonwamboldt:wordpress_access_control:*:*:*:*:*:wordpress:*:*

Information

Published : 2024-02-28 09:15

Updated : 2025-02-07 01:11


NVD link : CVE-2024-0975

Mitre link : CVE-2024-0975

CVE.ORG link : CVE-2024-0975


JSON object : View

Products Affected

brandonwamboldt

  • wordpress_access_control