The UsersWP WordPress plugin before 1.2.12 uses predictable filenames when an admin generates an export, which could allow unauthenticated attackers to download them and retrieve sensitive information such as IP, username, and email address
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/346c855a-4d42-4a87-aac9-e5bfc2242b16/ | Exploit Third Party Advisory |
Configurations
History
06 Jun 2025, 16:12
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ayecode:userswp:*:*:*:*:*:wordpress:*:* | |
CWE | NVD-CWE-noinfo | |
References | () https://wpscan.com/vulnerability/346c855a-4d42-4a87-aac9-e5bfc2242b16/ - Exploit, Third Party Advisory | |
First Time |
Ayecode userswp
Ayecode |
06 Sep 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
05 Aug 2024, 12:41
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
03 Aug 2024, 06:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-03 06:16
Updated : 2025-06-06 16:12
NVD link : CVE-2024-6477
Mitre link : CVE-2024-6477
CVE.ORG link : CVE-2024-6477
JSON object : View
Products Affected
ayecode
- userswp
CWE