Predictable Filenames in UsersWP Plugin Could Lead to Sensitive Information Disclosure
CVE-2024-6477
Key Information:
Badges
What is CVE-2024-6477?
The UsersWP plugin for WordPress prior to version 1.2.12 suffers from an information exposure vulnerability due to its use of predictable filenames during the export process by administrators. This flaw allows unauthenticated attackers to exploit the system and download exports containing sensitive information including IP addresses, usernames, and email addresses. Organizations using this plugin should update to the latest version promptly to mitigate risks associated with data exposure.
Affected Version(s)
UsersWP 0 < 1.2.12
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved