Vulnerability Description
The VK All in One Expansion Unit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 9.95.0.1 via social meta tags. This makes it possible for unauthenticated attackers to view limited password protected content.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vektor-Inc | Vk All In One Expansion Unit | < 9.96.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/vektor-inc/vk-all-in-one-expansion-unit/pull/1072Issue TrackingVendor Advisory
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ea2b5dca-42a5-49d4-800Third Party Advisory
- https://github.com/vektor-inc/vk-all-in-one-expansion-unit/pull/1072Issue TrackingVendor Advisory
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ea2b5dca-42a5-49d4-800Third Party Advisory
FAQ
What is CVE-2024-2093?
CVE-2024-2093 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The VK All in One Expansion Unit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 9.95.0.1 via social meta tags. This makes it possible for un...
How severe is CVE-2024-2093?
CVE-2024-2093 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2093?
Check the references section above for vendor advisories and patch information. Affected products include: Vektor-Inc Vk All In One Expansion Unit.