5.3

CVE-2022-2373

Exploit

Simply Schedule Appointments <= 1.5.7.5 - Unauthenticated Sensitive Information Exposure

The Simply Schedule Appointments WordPress plugin before 1.5.7.7 is missing authorisation in a REST endpoint, allowing unauthenticated users to retrieve WordPress users details such as name and email address
Mögliche Gegenmaßnahme
Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin: Update to version 1.5.7.7, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin
Version *-1.5.7.5
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NsquaSimply Schedule Appointments SwPlatformwordpress Version < 1.5.7.7
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 8.39% 0.92
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-862 Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.