First published: Thu Nov 30 2023(Updated: )
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Gopi Ramasamy Email download link.This issue affects Email download link: from n/a through 3.7.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gopiplus Email Download Link | <=3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-36523.
The title of this vulnerability is 'WordPress Email download link Plugin <= 3.7 is vulnerable to Sensitive Data Exposure.'
The severity of CVE-2023-36523 is medium with a CVSS score of 5.3.
The affected software for CVE-2023-36523 is Email download link: from n/a through 3.7.
To fix CVE-2023-36523, update the Email download link plugin to a version higher than 3.7.