The Simple Restrict plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.6 via the REST API. This makes it possible for authenticated attackers to bypass the plugin's restrictions to extract post titles and content
References
Configurations
History
11 Mar 2025, 13:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3035727%40simple-restrict&new=3035727%40simple-restrict&sfp_email=&sfph_mail= - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/65963ce0-6589-4753-837c-14ef37a1a9e3?source=cve - Third Party Advisory | |
First Time |
Wpchill simple Restrict
Wpchill |
|
CPE | cpe:2.3:a:wpchill:simple_restrict:*:*:*:*:*:wordpress:*:* | |
CWE | NVD-CWE-noinfo |
Information
Published : 2024-03-13 16:15
Updated : 2025-03-11 13:20
NVD link : CVE-2024-1083
Mitre link : CVE-2024-1083
CVE.ORG link : CVE-2024-1083
JSON object : View
Products Affected
wpchill
- simple_restrict
CWE