Unauthenticated Email Template Leak Vulnerability in Sensei LMS WordPress Plugin
CVE-2024-7786
5.3MEDIUM
Key Information:
- Vendor
- Wordpress
- Status
- Vendor
- CVE Published:
- 4 September 2024
Badges
πΎ Exploit Existsπ‘ Public PoC
Summary
The Sensei LMS WordPress plugin, prior to version 4.24.2, features improper access controls in certain REST API routes. This vulnerability enables unauthenticated attackers to gain access to sensitive email templates, potentially leading to information exposure. Proper security measures and updates are essential to safeguard against this type of unauthorized access, ensuring the integrity and confidentiality of user data.
Affected Version(s)
Sensei LMS 0 < 4.24.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Sushmita Poudel
WPScan