5.3
CVE-2024-0965
- EPSS 0.34%
- Veröffentlicht 08.02.2024 09:15:46
- Zuletzt bearbeitet 21.11.2024 08:47:54
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Simple Page Access Restriction <= 1.0.21 - Improper Access Control to Sensitive Information Exposure via REST API
The Simple Page Access Restriction plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.21 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's page restriction and view page content.
Mögliche Gegenmaßnahme
Simple Page Access Restriction: Update to version 1.0.23, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Simple Page Access Restriction
Version
*-1.0.21
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Pluginsandsnippets ≫ Simple Page Access Restriction SwPlatformwordpress Version <= 1.0.21
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.34% | 0.56 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
| security@wordfence.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|