First published: Thu Dec 19 2024(Updated: )
The WP Project Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.15 via the Project Task List ('/wp-json/pm/v2/projects/1/task-lists') REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including the hashed passwords of project owners (e.g. adminstrators).
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP Project Manager by WeDevs | <2.6.16 | |
WP Project Manager | <=2.6.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10548 has a moderate severity rating due to the potential for sensitive information exposure.
To fix CVE-2024-10548, update the WP Project Manager plugin to version 2.6.16 or later.
All users of the WP Project Manager plugin for WordPress up to and including version 2.6.15 are affected by CVE-2024-10548.
CVE-2024-10548 allows authenticated attackers to expose sensitive information through the project's task list API.
Yes, a patch is available in version 2.6.16 of the WP Project Manager plugin to address CVE-2024-10548.