Lucene search

K
cve[email protected]CVE-2024-1418
HistoryApr 04, 2024 - 6:15 a.m.

CVE-2024-1418

2024-04-0406:15:08
web.nvd.nist.gov
31
cve-2024-1418
sensitive information exposure
wordpress
rest api
unauthenticated attackers
protected posts
maintenance mode

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

9.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

The CGC Maintenance Mode plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2 via the REST API. This makes it possible for unauthenticated attackers to view protected posts via REST API even when maintenance mode is enabled.

Affected configurations

Vulners
Node
mordaukcgc_maintenance_modeRange1.2

CNA Affected

[
  {
    "vendor": "mordauk",
    "product": "CGC Maintenance Mode",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.2",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

9.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2024-1418