WordPress Plugin Vulnerabilities
Export Users to CSV < 1.4 - Unauthorised CSV Access
Description
The plugin exports a CSV file containing sensitive user data.
The generated files are stored in a public directory with a predictable filename based on a Unix timestamp. CSV files are discoverable either through enumeration or path traversal.
Export Users to CSV does not provide visibility over exported CSV files. Generated CSV files are stored indefinitely.
Timeline:
2019-07-23: Vulnerability found
2019-07-23: Reported to vendor
2019-07-23: Vendor responded
2019-08-09: Reported to WordPress Plugin Review Team
2019-08-09: WordPress Plugin Review Team responded
2019-08-09: Plugin closed on the WordPress plugin repository
2019-09-19: Vendor released a fixed version (1.4)
2019-10-07: Public disclosure
Affects Plugins
References
Miscellaneous
Original Researcher
Phil Wylie
Submitter
Phil Wylie
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2019-10-07 (about 6 years ago)
Added
2019-10-07 (about 6 years ago)
Last Updated
2019-10-07 (about 6 years ago)