[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fwUy8oJyvV_yV8bQi684attx9VQpZAMWgIJ-pP82alOo":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-2552","duplicator-wordpress-migration-plugin-sensitive-information-disclosure","Duplicator – WordPress Migration Plugin \u003C= 1.4.7 - Sensitive Information Disclosure","The Duplicator – WordPress Migration Plugin WordPress plugin is vulnerable to Unauthenticated System Information Disclosure in versions up to, and including, 1.4.7 via the 'view' or 'debug' parameter. This allows an unauthenticated attacker to obtain sensitive configuration information about the vulnerable system which includes details like PHP Version, Operating System, Full Path and more. This requires that the installer script has been run at least once by a site owner\u002Fadministrator.","duplicator",null,"\u003C=1.4.7","1.4.7.1","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2022-07-27 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F843ef712-6ca6-44d2-825f-7ce9a82d74e6?source=api-prod",545]