[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fGixs4yEz2WoTVGsfxmPyABPxvFZFJAizbFt9NG5H2cU":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-31249","subscribe-to-comments-reloaded-unauthenticated-sensitive-information-exposure","Subscribe To Comments Reloaded \u003C= 220725 - Unauthenticated Sensitive Information Exposure","The Subscribe To Comments Reloaded plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 220725 via log files. This makes it possible for unauthenticated attackers to extract sensitive data from log files.","subscribe-to-comments-reloaded",null,"\u003C=220725","240119","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2024-04-05 00:00:00","2024-04-11 16:29:54",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fc64956c3-b6f5-419e-82f3-3c9e90e1d677?source=api-prod",7]