5.3
CVE-2025-60119
- EPSS 0.03%
- Veröffentlicht 26.09.2025 09:15:38
- Zuletzt bearbeitet 26.09.2025 14:32:19
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
CoSchedule <= 3.3.11 - Unauthenticated Sensitive Information Exposure
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in CoSchedule CoSchedule allows Retrieve Embedded Sensitive Data. This issue affects CoSchedule: from n/a through 3.3.10.
Mögliche Gegenmaßnahme
CoSchedule: Update to version 3.4.0, or a newer patched version
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
CoSchedule
Version
*-3.3.11
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCoSchedule
≫
Produkt
CoSchedule
Default Statusunaffected
Version <=
3.3.10
Version
n/a
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.09 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| audit@patchstack.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere
The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.