First published: Tue Jan 07 2025(Updated: )
The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.10 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Passster | <=4.2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11282 has been classified as a high-severity vulnerability due to its potential for sensitive information exposure.
To fix CVE-2024-11282, update the Passster – Password Protect Pages and Content plugin to version 4.2.11 or later.
All users of the Passster – Password Protect Pages and Content plugin for WordPress up to version 4.2.10 are affected by CVE-2024-11282.
CVE-2024-11282 could allow unauthenticated attackers to access sensitive data through the WordPress core search feature.
There are no recommended workarounds for CVE-2024-11282; updating the plugin is the only effective solution.