Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/ | Mailing List Third Party Advisory |
https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve | Exploit Patch Third Party Advisory |
https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
16 Feb 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fedoraproject
Fedoraproject fedora |
|
CPE | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* |
|
References | () https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/ - Mailing List, Third Party Advisory |
20 Nov 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Nov 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Oct 2023, 18:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | CWE-200 |
16 Oct 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | (MISC) https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve - Third Party Advisory | |
References | (MISC) https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve - Exploit, Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
First Time |
Wordpress wordpress
Wordpress |
|
CPE | cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* |
13 Oct 2023, 12:47
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-13 12:15
Updated : 2024-02-16 17:16
NVD link : CVE-2023-39999
Mitre link : CVE-2023-39999
CVE.ORG link : CVE-2023-39999
JSON object : View
Products Affected
wordpress
- wordpress
fedoraproject
- fedora
CWE