[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fZiq-Za1EZlILKhKGcH3yrck2VF6smtXFCCXtkWsaYKk":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-52146","404-solution-sensitive-information-exposure-via-log-file","404 Solution \u003C= 2.33.0 - Sensitive Information Exposure via Log File","The 404 Solution plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.33.0 via the plugin's log file. This makes it possible for unauthenticated attackers to extract sensitive data including plugin configuration and debug data.","404-solution",null,"\u003C=2.33.0","2.33.1","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Insertion of Sensitive Information into Log File","2023-12-28 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F73643d45-9542-4372-a7a2-0a443819b8a2?source=api-prod",26]