2024-07-14 02:06:08 +00:00

52 lines
2.0 KiB
JSON

{
"id": "CVE-2024-1678",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:12.300",
"lastModified": "2024-05-02T18:00:37.360",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Subway \u2013 Private Site Option plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.4 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's private site feature and view restricted page and post content."
},
{
"lang": "es",
"value": "El complemento Subway \u2013 Private Site Option para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.1.4 incluida a trav\u00e9s de la API REST. Esto hace posible que atacantes no autenticados omitan la funci\u00f3n de sitio privado del complemento y vean p\u00e1ginas restringidas y contenido de publicaciones."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://wordpress.org/plugins/subway/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b80638b-4dd1-47f5-9a70-6bd626ac6986?source=cve",
"source": "security@wordfence.com"
}
]
}