Email Address Disclosure Vulnerability in Seriously Simple Podcasting WordPress Plugin
CVE-2023-6444

Currently unrated

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
11 March 2024

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

Summary

An unauthenticated crafted request can lead to the exposure of the podcast owner's email address, which typically aligns with the admin email address in the Seriously Simple Podcasting plugin for WordPress. This vulnerability persists in versions prior to 3.0.0, potentially impacting users by disclosing sensitive information without requiring authentication. Such exposure of personal data can lead to further security risks, including targeted phishing attacks.

Affected Version(s)

Seriously Simple Podcasting 0 < 3.0.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Krzysztof Zajฤ…c (CERT PL)
WPScan
.