CVE-2023-0749
CVSS V2 None
CVSS V3 None
Description
The Ocean Extra WordPress plugin before 2.1.3 does not ensure that the template to be loaded via a shortcode is actually a template, allowing any authenticated users such as subscriber to retrieve the content of arbitrary posts, such as draft, private or even password protected ones.
Overview
- CVE ID
- CVE-2023-0749
- Assigner
- contact@wpscan.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-13T17:15:12
- Last Modified Date
- 2023-03-16T15:54:06
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:oceanwp:ocean_extra:*:*:*:*:*:wordpress:*:* | 1 | OR | 2.1.3 |
References
Reference URL | Reference Tags |
---|---|
https://wpscan.com/vulnerability/9caa8d2e-383b-47d7-8d21-d2ed6b1664cb | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-0749 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0749 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 06:21:11 | Added to TrackCVE | |||
2023-04-17 06:21:13 | Weakness Enumeration | new |