CVE-2024-11282

The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.10 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpchill:passster:*:*:*:*:*:wordpress:*:*

History

05 Jun 2025, 15:42

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:wpchill:passster:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : 5.3
v2 : unknown
v3 : 7.5
First Time Wpchill passster
Wpchill
References () https://plugins.trac.wordpress.org/changeset/3211004/content-protector - () https://plugins.trac.wordpress.org/changeset/3211004/content-protector - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/11782a65-30b9-400e-8fe0-ab9f05ba5e42?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/11782a65-30b9-400e-8fe0-ab9f05ba5e42?source=cve - Third Party Advisory

07 Jan 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-07 07:15

Updated : 2025-06-05 15:42


NVD link : CVE-2024-11282

Mitre link : CVE-2024-11282


JSON object : View

Products Affected

wpchill

  • passster
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo