[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fUJZMgdPHj0oGcSVkdOjUFXmO76N3y72Msk6gnZAcY2s":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-32953","newsletters-information-exposure-via-log-files","Newsletters \u003C= 4.9.5 - Information Exposure via Log files","The Newsletters plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.9.5. This makes it possible for unauthenticated attackers to extract potentially sensitive information from log files.","newsletters-lite",null,"\u003C=4.9.5","4.9.6","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Insertion of Sensitive Information into Log File","2024-04-22 00:00:00","2024-04-29 14:08:42",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F867f374c-633f-4384-aa2b-5bb8daa5b7a2?source=api-prod",8]