cve/2024/CVE-2024-38747.md

18 lines
872 B
Markdown
Raw Normal View History

2024-08-13 18:35:37 +00:00
### [CVE-2024-38747](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38747)
![](https://img.shields.io/static/v1?label=Product&message=HitPay%20Payment%20Gateway%20for%20WooCommerce&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in HitPay Payment Solutions Pte Ltd HitPay Payment Gateway for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects HitPay Payment Gateway for WooCommerce: from n/a through 4.1.3.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds