Lucene search

K
cvelistPatchstackCVELIST:CVE-2023-36523
HistoryNov 30, 2023 - 3:20 p.m.

CVE-2023-36523 WordPress Email download link Plugin <= 3.7 is vulnerable to Sensitive Data Exposure

2023-11-3015:20:02
CWE-200
Patchstack
www.cve.org
cve-2023-36523
vulnerability
sensitive data exposure
wordpress email download link

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.0%

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Gopi Ramasamy Email download link.This issue affects Email download link: from n/a through 3.7.

CNA Affected

[
  {
    "collectionURL": "https://wordpress.org/plugins",
    "defaultStatus": "unaffected",
    "packageName": "email-download-link",
    "product": "Email download link",
    "vendor": "Gopi Ramasamy",
    "versions": [
      {
        "lessThanOrEqual": "3.7",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.0%

Related for CVELIST:CVE-2023-36523