The WP Maintenance plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 6.1.6 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's maintenance mode obtain post and page content via REST API.
References
Configurations
History
08 Apr 2026, 18:20
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:restezconnectes:wp_maintenance:*:*:*:*:*:wordpress:*:* | |
| CWE | CWE-284 NVD-CWE-noinfo |
|
| References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3035862%40wp-maintenance%2Ftrunk&old=3032356%40wp-maintenance%2Ftrunk&sfp_email=&sfph_mail=#file4 - Patch | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/645328f3-2bcb-4287-952c-2e23ec57bb4e?source=cve - Third Party Advisory | |
| First Time |
Restezconnectes
Restezconnectes wp Maintenance |
21 Nov 2024, 08:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3035862%40wp-maintenance%2Ftrunk&old=3032356%40wp-maintenance%2Ftrunk&sfp_email=&sfph_mail=#file4 - | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/645328f3-2bcb-4287-952c-2e23ec57bb4e?source=cve - |
29 Feb 2024, 01:43
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-29 01:43
Updated : 2026-04-08 18:20
NVD link : CVE-2024-1472
Mitre link : CVE-2024-1472
CVE.ORG link : CVE-2024-1472
JSON object : View
Products Affected
restezconnectes
- wp_maintenance
CWE
