[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fDGJ9g5XY8l4QlZzQ3dbvOTnmqwmQrIl5SPzSQJt3asg":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-6444","seriously-simple-podcasting-unauthenticated-email-disclosure","Seriously Simple Podcasting \u003C= 2.25.3 - Unauthenticated Email Disclosure","The Seriously Simple Podcasting plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.25.3 via the source code. This makes it possible for unauthenticated attackers to extract product owner emails, which can be an administrators.","seriously-simple-podcasting",null,"\u003C=2.25.3","3.0.0","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Insertion of Sensitive Information Into Sent Data","2024-02-17 00:00:00","2024-04-24 14:16:35",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F5268485f-d912-4c2d-a0ad-aabb69f9c98c?source=api-prod",68]