The Moving Users plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.05 via the export functionality. The JSON files are stored in predictable locations with guessable file names when exporting user data. This could allow unauthenticated attackers to extract sensitive user data, for instance, email addresses, hashed passwords, and IP addresses.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 17 Jan 2025 07:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Moving Users plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.05 via the export functionality. The JSON files are stored in predictable locations with guessable file names when exporting user data. This could allow unauthenticated attackers to extract sensitive user data, for instance, email addresses, hashed passwords, and IP addresses. | |
Title | Moving Users <= 1.05 - Unauthenticated Sensitive Information Exposure | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-12T18:44:10.720Z
Reserved: 2024-12-14T12:40:14.521Z
Link: CVE-2024-12637

Updated: 2025-02-12T18:43:53.959Z

Status : Received
Published: 2025-01-17T07:15:26.773
Modified: 2025-01-17T07:15:26.773
Link: CVE-2024-12637

No data.