{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T03:25:42.003","vulnerabilities":[{"cve":{"id":"CVE-2025-27001","sourceIdentifier":"audit@patchstack.com","published":"2025-03-28T10:15:15.953","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Insertion of Sensitive Information Into Sent Data vulnerability in Shipmondo Shipmondo – A complete shipping solution for WooCommerce pakkelabels-for-woocommerce allows Retrieve Embedded Sensitive Data.This issue affects Shipmondo – A complete shipping solution for WooCommerce: from n/a through <= 5.0.3."},{"lang":"es","value":"Vulnerabilidad de inserción de información confidencial en los datos enviados en Shipmondo Shipmondo – A complete shipping solution for WooCommerce, permite recuperar datos confidenciales integrados. Este problema afecta a Shipmondo, una solución de envío completa para WooCommerce: desde n/a hasta 5.0.3."}],"metrics":{},"weaknesses":[{"source":"audit@patchstack.com","type":"Secondary","description":[{"lang":"en","value":"CWE-201"}]}],"references":[{"url":"https://patchstack.com/database/Wordpress/Plugin/pakkelabels-for-woocommerce/vulnerability/wordpress-shipmondo-a-complete-shipping-solution-for-woocommerce-plugin-5-0-3-authenticated-arbitrary-wordpress-option-disclosure-vulnerability?_s_id=cve","source":"audit@patchstack.com"}]}}]}