0
CVE-2025-60119
- EPSS 0.03%
- Veröffentlicht 26.09.2025 09:15:38
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
CoSchedule <= 3.3.11 - Unauthenticated Sensitive Information Exposure
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in CoSchedule CoSchedule coschedule-by-todaymade allows Retrieve Embedded Sensitive Data.This issue affects CoSchedule: from n/a through <= 3.3.11.
Mögliche Gegenmaßnahme
CoSchedule: Update to version 3.4.0, or a newer patched version
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
CoSchedule
Version
*-3.3.11
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCoSchedule
≫
Produkt
CoSchedule
Default Statusunaffected
Version <=
3.3.11
Version
0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.072 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere
The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.