The Seriously Simple Podcasting WordPress plugin before 3.0.0 discloses the Podcast owner's email address (which by default is the admin email address) via an unauthenticated crafted request.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/061c59d6-f4a0-4cd1-b945-5e92b9c2b4aa/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/061c59d6-f4a0-4cd1-b945-5e92b9c2b4aa/ | Exploit Third Party Advisory |
Configurations
History
01 May 2025, 00:09
Type | Values Removed | Values Added |
---|---|---|
First Time |
Castos
Castos seriously Simple Podcasting |
|
References | () https://wpscan.com/vulnerability/061c59d6-f4a0-4cd1-b945-5e92b9c2b4aa/ - Exploit, Third Party Advisory | |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:castos:seriously_simple_podcasting:*:*:*:*:*:wordpress:*:* |
11 Mar 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-11 18:15
Updated : 2025-05-01 00:09
NVD link : CVE-2023-6444
Mitre link : CVE-2023-6444
JSON object : View
Products Affected
castos
- seriously_simple_podcasting
CWE