First published: Fri Dec 20 2024(Updated: )
The Page Restriction WordPress (WP) – Protect WP Pages/Post plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.3.6 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Protect WP Pages/Post | <=1.3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11297 is classified as a critical vulnerability due to its potential for sensitive information exposure.
To fix CVE-2024-11297, update the Page Restriction WordPress plugin to version 1.3.7 or later.
CVE-2024-11297 affects all versions of the Page Restriction WordPress plugin up to and including version 1.3.6.
The impact of CVE-2024-11297 allows unauthenticated attackers to exploit sensitive information through the WordPress core search feature.
A temporary workaround for CVE-2024-11297 is to disable the Page Restriction WordPress plugin until an update can be applied.