[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fR-sLK9-4jjXOejT0zv5S8hdSbrzrRhclHXkCh1mGFd4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-6750","wp-clone-sensitive-information-exposure","WP Clone \u003C= 2.4.2 - Sensitive Information Exposure","The Clone plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.4.2. This makes it possible for unauthenticated attackers to download database backups made with the plugin resulting in the potential of a complete site takeover.","wp-clone-by-wp-academy",null,"\u003C=2.4.2","2.4.3","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Exposure of Sensitive Information to an Unauthorized Actor","2023-12-18 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F44a921e7-cce3-4347-968d-76dab243fcd6?source=api-prod",36]