First published: Fri Jan 05 2024(Updated: )
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Uncanny Automator, Uncanny Owl Uncanny Automator – Automate everything with the #1 no-code automation and integration plugin.This issue affects Uncanny Automator – Automate everything with the #1 no-code automation and integration plugin: from n/a through 5.1.0.2.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Uncanny Owl Uncanny Automator Pro | <=5.1.0.2 |
Update to 5.1.0.3 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52151 has a moderate severity level due to its potential to expose sensitive information.
To mitigate CVE-2023-52151, users should update Uncanny Automator to the latest version beyond 5.1.0.2.
CVE-2023-52151 can lead to exposure of sensitive data logged by the Uncanny Automator plugin.
CVE-2023-52151 affects versions of the Uncanny Automator plugin up to 5.1.0.2 installed on WordPress sites.
Users of the Uncanny Automator plugin prior to version 5.1.0.2 may be impacted by CVE-2023-52151.