Sensitive Information Exposure in Passster WordPress Plugin by WordPress
CVE-2024-0616
5.3MEDIUM
Key Information:
- Vendor
Wordpress
- Vendor
- CVE Published:
- 29 February 2024
What is CVE-2024-0616?
The Passster plugin for WordPress, used for password protecting pages and content, is vulnerable to sensitive information exposure. This issue affects all versions up to 4.2.6.2 and allows unauthorized attackers to access sensitive data via the API. Consequently, attackers could retrieve post titles, slugs, IDs, content, and even passwords associated with protected posts and pages, leading to unauthorized disclosure of sensitive information.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Passster β Password Protect Pages and Content * <= 4.2.6.2
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Francesco Carlucci