{"containers":{"cna":{"affected":[{"product":"Popup by Supsystic","vendor":"Unknown","versions":[{"lessThan":"1.10.9","status":"affected","version":"1.10.9","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Felipe de Avila"}],"descriptions":[{"lang":"en","value":"The Popup by Supsystic WordPress plugin before 1.10.9 does not have any authentication and authorisation in an AJAX action, allowing unauthenticated attackers to call it and get the email addresses of subscribed users"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-306","description":"CWE-306 Missing Authentication for Critical Function","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-05-09T16:50:27.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f"}],"source":{"discovery":"EXTERNAL"},"title":"Popup by Supsystic < 1.10.9 - Unauthenticated Subscriber Email Addresses Disclosure","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2022-0424","STATE":"PUBLIC","TITLE":"Popup by Supsystic < 1.10.9 - Unauthenticated Subscriber Email Addresses Disclosure"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Popup by Supsystic","version":{"version_data":[{"version_affected":"<","version_name":"1.10.9","version_value":"1.10.9"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Felipe de Avila"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Popup by Supsystic WordPress plugin before 1.10.9 does not have any authentication and authorisation in an AJAX action, allowing unauthenticated attackers to call it and get the email addresses of subscribed users"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-306 Missing Authentication for Critical Function"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f","refsource":"MISC","url":"https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:25:40.455Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-0424","datePublished":"2022-05-09T16:50:28.000Z","dateReserved":"2022-01-31T00:00:00.000Z","dateUpdated":"2024-08-02T23:25:40.455Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}