[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fWeW01Ehdf4BwFzN4QhQsv9gnmsbmv0XvdcjHXM4EXes":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-2369","yaysmtp-simple-wp-smtp-mail-sensitive-information-disclosure","YaySMTP – Simple WP SMTP Mail  \u003C= 2.2 - Sensitive Information Disclosure","The YaySMTP WordPress plugin before 2.2.1 does not have capability check in an AJAX action, allowing any logged in users, such as subscriber to view the logs of the plugin","yaysmtp",null,">=2.2 \u003C=2.2","2.2.1","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2022-07-11 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fe5da24fa-fc7c-406b-896d-8cb8cc107cff?source=api-prod",561]