Search criteria
3 vulnerabilities found for wordpress_mobile_pack by wordpress_mobile_pack_project
CVE-2014-5337 (GCVE-0-2014-5337)
Vulnerability from cvelistv5 – Published: 2014-08-29 14:00 – Updated: 2024-08-06 11:41
VLAI?
Summary
The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:41:48.689Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/"
},
{
"name": "69292",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/69292"
},
{
"name": "60584",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60584"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-08-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-08-29T13:57:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/"
},
{
"name": "69292",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/69292"
},
{
"name": "60584",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60584"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-5337",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/",
"refsource": "CONFIRM",
"url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/"
},
{
"name": "69292",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69292"
},
{
"name": "60584",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60584"
},
{
"name": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/",
"refsource": "MISC",
"url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-5337",
"datePublished": "2014-08-29T14:00:00",
"dateReserved": "2014-08-18T00:00:00",
"dateUpdated": "2024-08-06T11:41:48.689Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-5337 (GCVE-0-2014-5337)
Vulnerability from nvd – Published: 2014-08-29 14:00 – Updated: 2024-08-06 11:41
VLAI?
Summary
The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:41:48.689Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/"
},
{
"name": "69292",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/69292"
},
{
"name": "60584",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60584"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-08-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-08-29T13:57:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/"
},
{
"name": "69292",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/69292"
},
{
"name": "60584",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60584"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-5337",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/",
"refsource": "CONFIRM",
"url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/"
},
{
"name": "69292",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69292"
},
{
"name": "60584",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60584"
},
{
"name": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/",
"refsource": "MISC",
"url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-5337",
"datePublished": "2014-08-29T14:00:00",
"dateReserved": "2014-08-18T00:00:00",
"dateUpdated": "2024-08-06T11:41:48.689Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2014-5337
Vulnerability from fkie_nvd - Published: 2014-08-29 13:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| wordpress_mobile_pack_project | wordpress_mobile_pack | * | |
| wordpress_mobile_pack_project | wordpress_mobile_pack | 1.2.0 | |
| wordpress_mobile_pack_project | wordpress_mobile_pack | 1.2.0 | |
| wordpress_mobile_pack_project | wordpress_mobile_pack | 1.2.0 | |
| wpmobilepack | wordpress_mobile_pack | 1.0.8223 | |
| wpmobilepack | wordpress_mobile_pack | 1.1.1 | |
| wpmobilepack | wordpress_mobile_pack | 1.1.2 | |
| wpmobilepack | wordpress_mobile_pack | 1.1.3 | |
| wpmobilepack | wordpress_mobile_pack | 1.1.9 | |
| wpmobilepack | wordpress_mobile_pack | 1.1.91 | |
| wpmobilepack | wordpress_mobile_pack | 1.1.92 | |
| wpmobilepack | wordpress_mobile_pack | 1.2.1 | |
| wpmobilepack | wordpress_mobile_pack | 1.2.3 | |
| wpmobilepack | wordpress_mobile_pack | 1.2.4 | |
| wpmobilepack | wordpress_mobile_pack | 1.2.5 | |
| wpmobilepack | wordpress_mobile_pack | 2.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "F147661F-7D08-4231-8229-B4273D67C958",
"versionEndIncluding": "2.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:1.2.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "EF6C3461-6D06-41C2-B7CB-8A15E77F1F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:1.2.0:b:*:*:*:wordpress:*:*",
"matchCriteriaId": "FA2446E1-1FE5-4EE5-BE90-A2230F0772C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:1.2.0:b2:*:*:*:wordpress:*:*",
"matchCriteriaId": "276E1165-2B5A-48C9-B531-6B5234218037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.0.8223:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "FB60A4D2-A776-42A6-8AE6-788D8D0DA8EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "5907D0D5-D160-4AE9-8DBD-0D48ECF06FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.2:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "FE9DD3FC-F06B-4B46-A1D8-83A6447919A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "4ADFFC5D-9C60-40D7-B3A7-E19B52262227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.9:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "92964F06-6BD9-4C99-84B4-82DD621D3875",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.91:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "518DDAA6-0C6E-473F-BDC7-F7B3DC18F2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.92:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "FB8A85F7-388A-477E-930B-4F2C1756BF9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "1651AC7B-4ECA-4F26-85FB-0B1EE4C1FDF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "75A8B3EC-E9AC-4765-9B66-ECE7987C0C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.4:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "AE63A1AE-BE24-49D1-B72E-2780E4111F4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.5:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "47D24AAA-CC3D-4611-91DD-A7680303EFF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:2.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "EAD0E689-0205-4C2B-AC4D-22BE96AA03CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php."
},
{
"lang": "es",
"value": "El plugin WordPress Mobile Pack anterior a 2.0.2 para WordPress no restringe debidamente el acceso a los puesto protegidos por contrase\u00f1a, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una acci\u00f3n exportarticles en export/content.php."
}
],
"id": "CVE-2014-5337",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-08-29T13:55:05.410",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/60584"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/69292"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/60584"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/69292"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}