Home

Description

The Melhor Envio plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.15.9 via the 'run' function, which uses a hardcoded hash. This makes it possible for unauthenticated attackers to extract sensitive data including environment information, plugin tokens, shipping configurations, and limited vendor information.

PUBLISHED Reserved 2025-01-31 | Published 2025-04-08 | Updated 2025-04-08 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-04-07:Disclosed

Credits

Luciano Hanna finder

References

www.wordfence.com/...-5cd3-41a0-b86b-d00338334d2e?source=cve

github.com/...4534eb8a27ec99d9601af/Services/TestService.php

plugins.trac.wordpress.org/...trunk/Services/TestService.php

plugins.trac.wordpress.org/...trunk/Services/TestService.php

cve.org (CVE-2024-13820)

nvd.nist.gov (CVE-2024-13820)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.