The Leyka plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.30.3 via the 'leyka_ajax_get_env_and_options' function. This can allow authenticated attackers with subscriber-level permissions or above to extract sensitive data including Sberbank API key and password, PayPal Client Secret, and more keys and passwords.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/leyka/tags/3.30.3/inc/leyka-ajax.php#L393 | Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/dcd24b90-94ff-4625-8e3e-9c90e38683f9?source=cve | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-09-13T02:54:12.803Z
Updated: 2023-09-13T02:54:12.803Z
Reserved: 2023-09-12T14:51:23.730Z
Link: CVE-2023-4917
JSON object: View
NVD Information
Status : Modified
Published: 2023-09-13T03:15:09.457
Modified: 2023-11-07T04:23:09.683
Link: CVE-2023-4917
JSON object: View
Redhat Information
No data.
CWE
No CWE.