[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fzkPGXgw1r6BTp5zNeNFqHmpcrpiKOdEJil_y0Y5KsuM":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20,"patch_diff_files":21,"patch_trac_url":9},"CVE-2022-2373","simply-schedule-appointments-unauthenticated-sensitive-information-exposure","Simply Schedule Appointments \u003C= 1.5.7.5 - Unauthenticated Sensitive Information Exposure","The Simply Schedule Appointments plugin for WordPress is vulnerable to sensitive information exposure in versions up to, and including 1.5.7.5 due to missing capability checks on the \u002Fwp-json\u002Fssa\u002Fv1\u002Fusers REST API endpoint. This makes it possible for unauthenticated attackers to retrieve a list of email addresses associated with the users that are registered on the site.","simply-schedule-appointments",null,"\u003C=1.5.7.5","1.5.7.7","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2022-08-08 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F9614aaa9-d343-4fd4-8a40-7366cd961bd3?source=api-prod",533,[]]