[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fXEMyzXwtgqMq4vX2M4NcTklwH9Fwnkw3JN5ofw-PChc":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-13558","np-quote-request-for-woocommerce-insecure-direct-object-reference-to-unauthenticated-sensitive-information-disclosure","NP Quote Request for WooCommerce \u003C= 1.9.179 - Insecure Direct Object Reference to Unauthenticated Sensitive Information Disclosure","The NP Quote Request for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.9.179 due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to read the content of quote requests.","woo-rfq-for-woocommerce",null,"\u003C=1.9.179","1.9.180","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Authorization Bypass Through User-Controlled Key","2025-03-19 22:42:46","2025-03-20 11:11:27",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F5991c86b-6785-41a6-a5df-c65e8a28201c?source=api-prod",1]