{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T14:29:10.669","vulnerabilities":[{"cve":{"id":"CVE-2023-5359","sourceIdentifier":"security@wordfence.com","published":"2024-09-25T01:15:39.730","lastModified":"2024-09-30T14:19:15.970","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The W3 Total Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.7.5 via Google OAuth API secrets stored in plaintext in the publicly visible plugin source. This can allow unauthenticated attackers to impersonate W3 Total Cache and gain access to user account information in successful conditions. This would not impact the WordPress users site in any way."},{"lang":"es","value":"El complemento W3 Total Cache para WordPress es vulnerable a la exposición de información confidencial en versiones hasta la 2.7.5 incluida, a través de secretos de la API de Google OAuth almacenados en texto plano en la fuente del complemento visible públicamente. Esto puede permitir que atacantes no autenticados se hagan pasar por W3 Total Cache y obtengan acceso a la información de la cuenta del usuario en condiciones exitosas. Esto no afectaría al sitio de los usuarios de WordPress de ninguna manera."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-312"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:boldgrid:w3_total_cache:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.7.6","matchCriteriaId":"E67A0E45-1E2E-4ECA-8B03-AB56A64CA1A5"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/w3-total-cache/trunk/PageSpeed_Api.php#L39","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset/3156426/w3-total-cache/tags/2.7.6/PageSpeed_Api.php","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/2d89a534-978e-4fd8-be3a-5137bdc22dc9?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}