The Log WP_Mail WordPress plugin through 0.1 saves sent email in a publicly accessible directory using predictable filenames, allowing any unauthenticated visitor to obtain potentially sensitive information like generated passwords.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/ee10f21f-4476-4f3d-85ed-94d438c61ec2 | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/ee10f21f-4476-4f3d-85ed-94d438c61ec2 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:40
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://wpscan.com/vulnerability/ee10f21f-4476-4f3d-85ed-94d438c61ec2 - Exploit, Third Party Advisory |
07 Nov 2023, 03:41
| Type | Values Removed | Values Added |
|---|---|---|
| CWE |
24 Jul 2023, 13:30
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-732 |
Information
Published : 2022-06-13 13:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1412
Mitre link : CVE-2022-1412
CVE.ORG link : CVE-2022-1412
JSON object : View
Products Affected
premierethemes
- log_wp_mail
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
