The CGC Maintenance Mode plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2 via the REST API. This makes it possible for unauthenticated attackers to view protected posts via REST API even when maintenance mode is enabled.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-17172 The CGC Maintenance Mode plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2 via the REST API. This makes it possible for unauthenticated attackers to view protected posts via REST API even when maintenance mode is enabled.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T18:40:20.935Z

Reserved: 2024-02-09T19:06:11.501Z

Link: CVE-2024-1418

cve-icon Vulnrichment

Updated: 2024-08-01T18:40:20.935Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-04T06:15:08.783

Modified: 2024-11-21T08:50:32.733

Link: CVE-2024-1418

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:16:24Z

Weaknesses

No weakness.