[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f36sRfhIgwu9Do2f0U92NRAv0uvkzi2Pl3GLR4ln9yNQ":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-5003","active-directory-integration-ldap-integration-unauthenticated-information-disclosure-2","Active Directory Integration \u002F LDAP Integration \u003C= 4.1.9 - Unauthenticated Information Disclosure","The Active Directory Integration \u002F LDAP Integration plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.1.9 via log files that are left over and not deleted. This makes it possible for unauthenticated attackers to extract potentially sensitive data including errors and information contained in the plugin's log files.","ldap-login-for-intranet-sites",null,"\u003C=4.1.9","4.1.10","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Insertion of Sensitive Information into Externally-Accessible File or Directory","2023-09-25 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F8a15ab92-2142-43cb-9600-f4cfa164de31?source=api-prod",120]