[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fcxkpRTqw90ISsphy0sZV62EANK2WPNE2DrIuQC7eAi8":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-52151","uncanny-automator-sensitive-information-exposure-via-log-file","Uncanny Automator \u003C= 5.1.0.2 - Sensitive Information Exposure via Log File","The Uncanny Automator – Automate everything with the #1 no-code automation and integration plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.1.0.2 via the plugin's log file. This makes it possible for unauthenticated attackers to extract sensitive data including plugin debug data.","uncanny-automator",null,"\u003C=5.1.0.2","5.1.0.3","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Insertion of Sensitive Information Into Debugging Code","2023-12-28 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F5098e74a-9a99-48b3-9f44-b780bfdeb24e?source=api-prod",26]