[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fCvccN2H6qbhFUkLuFXT9eAdeXCeuLHE9RHbvmmBzTPI":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-38699","wallet-system-for-woocommerce-information-exposure-via-log-files","Wallet System for WooCommerce \u003C= 2.5.13 - Information Exposure via Log Files","The Wallet System for WooCommerce – Wallet, Digital Wallet, Cashback, Recharge User Wallets, Partial Payments, Wallet restriction, Refunds plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.5.13 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log files.","wallet-system-for-woocommerce",null,"\u003C=2.5.13","2.5.14","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Insertion of Sensitive Information into Log File","2024-07-11 00:00:00","2024-07-17 14:18:18",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F19f8a656-696c-4e4f-a0a6-c71010a1ee12?source=api-prod",7]