[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fWV9Yqa4cNuwoiOAFo4V8kCNlIaUhg85NRsQ6jTD88Qs":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-e8efc5cf-3497-4426-a8a5-740783a7c2c9-acumbamail-signup-forms","acumbamail-sensitive-information-disclosure","Acumbamail \u003C 1.0.4.1 - Sensitive Information Disclosure","The Acumbamail plugin for WordPress is vulnerable to Sensitive Data Exposure in versions up to, and including, 1.0.4 via the callAPI function. This can allow unauthenticated attackers to extract sensitive data including emails, passwords, usernames, etc.","acumbamail-signup-forms",null,"\u003C1.0.4.1","1.0.4.1","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2014-04-30 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fe8efc5cf-3497-4426-a8a5-740783a7c2c9?source=api-prod",3555]