{ "id": "CVE-2024-8195", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-28T14:15:08.990", "lastModified": "2024-09-13T19:28:04.623", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Permalink Manager Lite plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'debug_data', 'debug_query', and 'debug_redirect' functions in all versions up to, and including, 2.4.4. This makes it possible for unauthenticated attackers to extract sensitive data including password, title, and content of password-protected posts." }, { "lang": "es", "value": "El complemento Permalink Manager Lite para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de comprobaci\u00f3n de las funciones 'debug_data', 'debug_query' y 'debug_redirect' en todas las versiones hasta la 2.4.4 incluida. Esto permite que atacantes no autenticados extraigan datos confidenciales, como contrase\u00f1as, t\u00edtulos y contenido de publicaciones protegidas con contrase\u00f1a." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 3.9, "impactScore": 1.4 }, { "source": "security@wordfence.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "security@wordfence.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-862" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:permalink_manager_lite_project:permalink_manager_lite:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.4.4.1", "matchCriteriaId": "C86504AE-D238-4AE5-9A5C-289A364D5D9E" } ] } ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/permalink-manager/tags/2.4.4/includes/core/permalink-manager-debug.php#L70", "source": "security@wordfence.com", "tags": [ "Product" ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3142479/", "source": "security@wordfence.com", "tags": [ "Patch" ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aadf1d59-60ba-4da2-adbb-4e84d587a34d?source=cve", "source": "security@wordfence.com", "tags": [ "Third Party Advisory" ] } ] }