[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fbUBJv6XYMfpWmuYIXNeI7hdbWcvI1p0TpbK2nQfa2-M":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-a9743351-9f28-49bf-8b08-85ffbdcfa5f0-co-authors-plus","co-authors-plus-sensitive-information-disclosure","Co-Authors Plus 3.5 - 3.5.1 - Sensitive Information Disclosure","The Co-Authors Plus plugin for WordPress is vulnerable to sensitive information disclosure via the \u002Fwp\u002Fv2\u002Fcoauthors REST API input in versions 3.5 and 3.5.1. This is due to insufficient capability checking that allows unauthorized users to access the endpoint and retrieve guest authors email addresses.","co-authors-plus",null,">=3.5 \u003C=3.5.1","3.5.2","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2022-06-07 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fa9743351-9f28-49bf-8b08-85ffbdcfa5f0?source=api-prod",595]