{"containers":{"cna":{"affected":[{"product":"RSVP and Event Management Plugin","vendor":"Unknown","versions":[{"lessThan":"2.7.2*","status":"affected","version":"2.7.2","versionType":"custom"},{"lessThan":"2.7.8","status":"affected","version":"2.7.8","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Daniel Ruf"}],"descriptions":[{"lang":"en","value":"The RSVP and Event Management Plugin WordPress plugin before 2.7.8 does not have any authorisation checks when exporting its entries, and has the export function hooked to the init action. As a result, unauthenticated attackers could call it and retrieve PII such as first name, last name and email address of user registered for events"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-862","description":"CWE-862 Missing Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-04-18T17:10:47.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/95a5fad1-e823-4571-8640-19bf5436578d"}],"source":{"discovery":"EXTERNAL"},"title":"RSVP and Event Management < 2.7.8 - Unauthenticated Entries Export","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2022-1054","STATE":"PUBLIC","TITLE":"RSVP and Event Management < 2.7.8 - Unauthenticated Entries Export"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"RSVP and Event Management Plugin","version":{"version_data":[{"version_affected":">=","version_name":"2.7.2","version_value":"2.7.2"},{"version_affected":"<","version_name":"2.7.8","version_value":"2.7.8"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Daniel Ruf"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The RSVP and Event Management Plugin WordPress plugin before 2.7.8 does not have any authorisation checks when exporting its entries, and has the export function hooked to the init action. As a result, unauthenticated attackers could call it and retrieve PII such as first name, last name and email address of user registered for events"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-862 Missing Authorization"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/95a5fad1-e823-4571-8640-19bf5436578d","refsource":"MISC","url":"https://wpscan.com/vulnerability/95a5fad1-e823-4571-8640-19bf5436578d"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:47:43.258Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/95a5fad1-e823-4571-8640-19bf5436578d"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-1054","datePublished":"2022-04-18T17:10:47.000Z","dateReserved":"2022-03-22T00:00:00.000Z","dateUpdated":"2024-08-02T23:47:43.258Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}