[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fhg0BXpLFaCd3ktr0ZD3s83Dy23Z6KTHhnOQKyW1je2U":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-ecd68933-e808-4816-b9d2-7491194f2347-stream","stream-sensitive-data-exposure","Stream \u003C= 3.0.5 - Sensitive Data Exposure","The Stream plugin for WordPress is vulnerable to Sensitive Data Exposure in versions up to, and including, 3.0.5. This can allow unauthenticated attackers to extract sensitive data including logged entries.","stream",null,"\u003C=3.0.5","3.0.6","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2016-05-31 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fecd68933-e808-4816-b9d2-7491194f2347?source=api-prod",2793]