2 results (0.003 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wp2speed WP2Speed Faster allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WP2Speed Faster: from n/a through 1.0.1. The WP2Speed Faster – Optimize PageSpeed Insights Score 90-100 plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.1. This makes it possible for unauthenticated attackers to extract potentially sensitive information. • https://patchstack.com/database/vulnerability/wp2speed/wordpress-wp2speed-faster-optimize-pagespeed-insights-score-90-100-plugin-1-0-1-sensitive-data-exposure-vulnerability?_s_id=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The WP2Speed Faster – Optimize PageSpeed Insights Score 90-100 plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 1.0.1. This is due to the use of hardcoded credentials to authenticate all the incoming API requests. This makes it possible for unauthenticated attackers to overwrite CSS, update the trial settings, purge the cache, and find attachments. El complemento WP2Speed Faster – Optimize PageSpeed Insights Score 90-100 para WordPress es vulnerable al acceso no autorizado en todas las versiones hasta la 1.0.1 incluida. Esto se debe al uso de credenciales codificadas para autenticar todas las solicitudes API entrantes. • https://plugins.trac.wordpress.org/browser/wp2speed/trunk/lib/includes/optimize.php#L152 https://plugins.trac.wordpress.org/browser/wp2speed/trunk/lib/includes/optimize.php#L165 https://plugins.trac.wordpress.org/browser/wp2speed/trunk/lib/includes/optimize.php#L263 https://plugins.trac.wordpress.org/browser/wp2speed/trunk/lib/includes/optimize.php#L372 https://plugins.trac.wordpress.org/browser/wp2speed/trunk/lib/includes/optimize.php#L71 https://www.wordfence.com/threat-intel/vulnerabilities/id/1fe97ac1- • CWE-798: Use of Hard-coded Credentials •