๐Ÿ” CVE Alert

CVE-2024-0909

MEDIUM 5.3

Anonymous Restricted Content <= 1.6.2 - Protection Mechanism Bypass

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

The Anonymous Restricted Content plugin for WordPress is vulnerable to information disclosure in all versions up to, and including, 1.6.2. This is due to insufficient restrictions through the REST API on the posts/pages that protections are being place on. This makes it possible for unauthenticated attackers to access protected content.

CWE CWE-200
Vendor cayenne
Product anonymous restricted content
Published Feb 3, 2024
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for cayenne anonymous restricted content

Be the first to know when new medium vulnerabilities affecting cayenne anonymous restricted content are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

cayenne / Anonymous Restricted Content
0 โ‰ค 1.6.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/f478ff7c-7193-4c59-a84f-c7cafff9b6c0?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3030199%40anonymous-restricted-content&new=3030199%40anonymous-restricted-content&sfp_email=&sfph_mail= plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3030608%40anonymous-restricted-content&new=3030608%40anonymous-restricted-content&sfp_email=&sfph_mail=

Credits

Francesco Carlucci