The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.10 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
References
Configurations
History
05 Jun 2025, 15:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset/3211004/content-protector - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/11782a65-30b9-400e-8fe0-ab9f05ba5e42?source=cve - Third Party Advisory | |
First Time |
Wpchill passster
Wpchill |
|
Summary |
|
|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:wpchill:passster:*:*:*:*:*:wordpress:*:* |
07 Jan 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-07 07:15
Updated : 2025-06-05 15:42
NVD link : CVE-2024-11282
Mitre link : CVE-2024-11282
CVE.ORG link : CVE-2024-11282
JSON object : View
Products Affected
wpchill
- passster
CWE