{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T00:09:54.988","vulnerabilities":[{"cve":{"id":"CVE-2024-12315","sourceIdentifier":"security@wordfence.com","published":"2025-02-12T09:15:08.247","lastModified":"2025-02-25T19:37:04.210","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Export All Posts, Products, Orders, Refunds & Users plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.3 via the exports directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/smack_uci_uploads/exports/ directory which can contain information like exported user data."},{"lang":"es","value":"El complemento Export All Posts, Products, Orders, Refunds &amp; Users para WordPress es vulnerable a la exposición de información confidencial en todas las versiones hasta 2.9.3 incluida, a través del directorio de exportaciones. Esto permite que atacantes no autenticados extraigan datos confidenciales almacenados de forma insegura en el directorio /wp-content/uploads/smack_uci_uploads/exports/ que pueden contener información como datos de usuario exportados."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-922"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:smackcoders:export_all_posts\\,_products\\,_orders\\,_refunds_\\&_users:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.10","matchCriteriaId":"D44725ED-3930-422F-A846-3D0F53B3EB7E"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/wp-ultimate-exporter/trunk/exportExtensions/ExportExtension.php#L1678","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3230400%40wp-ultimate-exporter&new=3230400%40wp-ultimate-exporter&sfp_email=&sfph_mail=","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/075709e0-5f00-4d7b-80f6-96e3b4b4a895?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}