Predictable Filenames in UsersWP Plugin Could Lead to Sensitive Information Disclosure
CVE-2024-6477

Currently unrated

Key Information:

Vendor

Wordpress

Status
Vendor
CVE Published:
3 August 2024

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2024-6477?

The UsersWP WordPress plugin before 1.2.12 uses predictable filenames when an admin generates an export, which could allow unauthenticated attackers to download them and retrieve sensitive information such as IP, username, and email address

Affected Version(s)

UsersWP 0 < 1.2.12

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Majdeddine Ben Hadj Brahim
WPScan
.