[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fbZvwfa2HSU__kyZ15IXWbzOMZDq9aZWq1jCeitJ4KZE":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-11094","404-solution-missing-authentication-to-sensitive-information-exposure","404 Solution \u003C= 2.35.17 - Missing Authentication to Sensitive Information Exposure","The 404 Solution plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.35.17 via the export feature. This makes it possible for unauthenticated attackers to extract data such as redirects including GET parameters which may reveal sensitive information. On most sites this is unlikely to be the case.","404-solution",null,"\u003C=2.35.17","2.35.18","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Data Element to Wrong Session","2024-11-15 20:57:53","2024-11-19 15:32:50",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fd738be73-2573-4fb8-b6f0-768a08628265?source=api-prod",4]