[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fkNwTsPM-djMydfBh2wYUM-fAOWPob8dpg18VrcrvUFc":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-43230","shared-files-unauthenticated-sensitive-information-exposure","Shared Files \u003C= 1.7.28 - Unauthenticated Sensitive Information Exposure","The Shared Files – Frontend File Upload Form & Secure File Sharing plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.7.28 via the export functionality and lack of protected directory. This makes it possible for unauthenticated attackers to extract sensitive data information from export files generated by the plugin.","shared-files",null,"\u003C=1.7.28","1.7.29","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2024-08-09 00:00:00","2024-08-13 20:44:14",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fe4ae2b7d-e48d-4880-9202-6e564a3b404f?source=api-prod",5]