The WordPress plugin Be POPIA Compliant exposed sensitive information to unauthenticated users consisting of site visitors emails and usernames via an API route, in versions up to an including 1.1.5.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2701343%40be-popia-compliant&new=2701343%40be-popia-compliant&sfp_email=&sfph_mail= | Patch Release Notes Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1186 | Third Party Advisory |
Configurations
Information
Published : 2022-04-19 14:15
Updated : 2022-04-27 09:50
NVD link : CVE-2022-1186
Mitre link : CVE-2022-1186
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
web-x.co
- be_popia_compliant