The Leyka plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.30.3 via the 'leyka_ajax_get_env_and_options' function. This can allow authenticated attackers with subscriber-level permissions or above to extract sensitive data including Sberbank API key and password, PayPal Client Secret, and more keys and passwords.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/leyka/tags/3.30.3/inc/leyka-ajax.php#L393 | Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/dcd24b90-94ff-4625-8e3e-9c90e38683f9?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-09-13 03:15
Updated : 2023-11-07 04:23
NVD link : CVE-2023-4917
Mitre link : CVE-2023-4917
CVE.ORG link : CVE-2023-4917
JSON object : View
Products Affected
te-st
- leyka
CWE
No CWE.