Lucene search

K
cve[email protected]CVE-2024-1472
HistoryFeb 29, 2024 - 1:43 a.m.

CVE-2024-1472

2024-02-2901:43:51
web.nvd.nist.gov
39
wp maintenance
wordpress
information exposure
vulnerability
rest api
cve-2024-1472

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

6.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

The WP Maintenance plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 6.1.6 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin’s maintenance mode obtain post and page content via REST API.

Affected configurations

Vulners
Node
florent73wp_maintenanceRange6.1.6

CNA Affected

[
  {
    "vendor": "florent73",
    "product": "WP Maintenance",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "6.1.6",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

6.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

Related for CVE-2024-1472