Lucene search

K
cveWPScanCVE-2023-6444
HistoryMar 11, 2024 - 6:15 p.m.

CVE-2023-6444

2024-03-1118:15:17
WPScan
web.nvd.nist.gov
37
cve-2023-6444
seriously simple podcasting
wordpress
plugin
security vulnerability
email disclosure
unauthenticated crafted request
nvd

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

22.6%

The Seriously Simple Podcasting WordPress plugin before 3.0.0 discloses the Podcast owner’s email address (which by default is the admin email address) via an unauthenticated crafted request.

Affected configurations

Vulners
Vulnrichment
Node
castosseriously_simple_podcastingRange<3.0.0wordpress
VendorProductVersionCPE
castosseriously_simple_podcasting*cpe:2.3:a:castos:seriously_simple_podcasting:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "Seriously Simple Podcasting",
    "versions": [
      {
        "status": "affected",
        "versionType": "semver",
        "version": "0",
        "lessThan": "3.0.0"
      }
    ],
    "defaultStatus": "unaffected",
    "collectionURL": "https://wordpress.org/plugins"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

22.6%