First published: Tue Feb 20 2024(Updated: )
The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.6.2 via API. This makes it possible for unauthenticated attackers to obtain post titles, slugs, IDs, content and other metadata including passwords of password-protected posts and pages.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Passster | <=4.2.6.2 | |
Wpchill Passster | <4.2.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0616 is classified as a high-severity vulnerability due to its ability to expose sensitive information.
To fix CVE-2024-0616, update the Passster – Password Protect Pages and Content plugin to version 4.2.6.3 or later.
CVE-2024-0616 affects all versions of Passster – Password Protect Pages and Content plugin up to and including 4.2.6.2.
CVE-2024-0616 can expose post titles, slugs, IDs, content, and other metadata to unauthenticated attackers.
CVE-2024-0616 can be exploited by unauthenticated attackers, making it especially concerning for WordPress sites.