The WP Maintenance plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 6.1.6 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's maintenance mode obtain post and page content via REST API.
CVSS
No CVSS.
References
Configurations
History
27 Feb 2025, 22:03
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:restezconnectes:wp_maintenance:*:*:*:*:*:wordpress:*:* | |
| First Time |
Restezconnectes wp Maintenance
Restezconnectes |
|
| References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3035862%40wp-maintenance%2Ftrunk&old=3032356%40wp-maintenance%2Ftrunk&sfp_email=&sfph_mail=#file4 - Patch | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/645328f3-2bcb-4287-952c-2e23ec57bb4e?source=cve - Third Party Advisory |
29 Feb 2024, 01:43
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-29 01:43
Updated : 2025-02-27 22:03
NVD link : CVE-2024-1472
Mitre link : CVE-2024-1472
JSON object : View
Products Affected
restezconnectes
- wp_maintenance
CWE
No CWE.
