[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$feUeHf-UANi04QekDhVJ0sxHuAilbl4-c4AiQHLOg3XE":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-44991","media-file-renamer-sensitive-information-exposure-via-log-file","Media File Renamer \u003C= 5.6.9 - Sensitive Information Exposure via Log File","The Media File Renamer: Rename Files (Manual, Auto & AI) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.6.9 via the logging functionality. This makes it possible for unauthenticated attackers to extract sensitive data including file upload events and paths.","media-file-renamer",null,"\u003C=5.6.9","5.7.0","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2023-11-28 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F71e55161-f5ad-44e5-8a61-ce48c05e6dba?source=api-prod",56]