漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
WP Front User Submit < 5.0.6 - Unauthenticated Sensitive Information Exposure
Vulnerability Description
The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6 allows passing a URL parameter to regenerate a .json file based on demo data that it initially creates. If an administrator modifies the demo form and enables admin notifications in the Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6's settings, it is possible for an unauthenticated attacker to export and download all of the form data/settings, including the administrator's email address.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
WordPress plugin Guest posting / Frontend Posting / Front Editor 安全漏洞
Vulnerability Description
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin Guest posting / Frontend Posting / Front Editor 5.0.6之前版本存在安全漏洞,该漏洞源于允许通过URL参数重新生成.json文件,可能导致未经身份验证的攻击者导出和下
CVSS Information
N/A
Vulnerability Type
N/A