The WP Project Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.15 via the Project Task List ('/wp-json/pm/v2/projects/1/task-lists') REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including the hashed passwords of project owners (e.g. adminstrators).
Metrics
Affected Vendors & Products
References
History
Wed, 05 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wedevs
Wedevs wp Project Manager |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:wedevs:wp_project_manager:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Wedevs
Wedevs wp Project Manager |
Fri, 20 Dec 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Dec 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WP Project Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.15 via the Project Task List ('/wp-json/pm/v2/projects/1/task-lists') REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including the hashed passwords of project owners (e.g. adminstrators). | |
Title | WP Project Manager <= 2.6.15 - Authenticated (Subscriber+) Sensitive Information Exposure via Project Task List REST API | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-12-20T17:41:39.731Z
Reserved: 2024-10-30T16:11:41.939Z
Link: CVE-2024-10548

Updated: 2024-12-20T16:46:04.692Z

Status : Analyzed
Published: 2024-12-19T02:15:22.420
Modified: 2025-02-05T16:49:13.003
Link: CVE-2024-10548

No data.