// For flags

CVE-2023-37868

WordPress Premium Addons PRO Plugin <= 2.9.0 is vulnerable to Sensitive Data Exposure

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Leap13 Premium Addons PRO.This issue affects Premium Addons PRO: from n/a through 2.9.0.

Exposición de información confidencial a una vulnerabilidad de actor no autorizado en Leap13 Premium Addons PRO. Este problema afecta a Premium Addons PRO: desde n/a hasta 2.9.0.

The Premium Addons PRO plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.9.0. This makes it possible for contributor-level attackers to retrieve sensitive data.

*Credits: Rafie Muhammad (Patchstack)
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-07-10 CVE Reserved
  • 2023-07-10 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-10-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Leap13
Search vendor "Leap13"
Premium Addons
Search vendor "Leap13" for product "Premium Addons"
<= 2.9.0
Search vendor "Leap13" for product "Premium Addons" and version " <= 2.9.0"
pro, wordpress
Affected