5.3
CVE-2024-0910
- EPSS 0.46%
- Veröffentlicht 06.06.2024 02:15:53
- Zuletzt bearbeitet 08.04.2026 17:17:27
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Restrict for Elementor <= 1.0.7 - Protection Mechanism Bypass
The Restrict for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.7 due to improper restrictions on hidden data that make it accessible through the REST API. This makes it possible for unauthenticated attackers to extract potentially sensitive data from post content.
Mögliche Gegenmaßnahme
Restrict for Elementor: Update to version 1.0.8, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Restrict for Elementor
Version
*-1.0.7
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Restrict ≫ Restrict For Elementor SwPlatformwordpress Version < 1.0.8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.46% | 0.642 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.