[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f9smE46oD9ujfbprk7YBVQOIM349UUX28oYB1Sjt5FZo":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-25591","wp-editor-sensitive-information-exposure-via-log-file","WP Editor \u003C= 1.2.7 - Sensitive Information Exposure via log file","The WP Editor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.7 via the plugin's log file. This makes it possible for unauthenticated attackers to extract sensitive data including configuration information.","wp-editor",null,"\u003C=1.2.7","1.2.8","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Insertion of Sensitive Information into Log File","2024-02-12 00:00:00","2024-02-14 20:47:54",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F66b1f539-9192-43f5-a77d-9763024e6b74?source=api-prod",3]