{"id":3428,"date":"2024-04-03T17:45:13","date_gmt":"2024-04-03T17:45:13","guid":{"rendered":"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/"},"modified":"2024-04-03T17:45:13","modified_gmt":"2024-04-03T17:45:13","slug":"exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/","title":{"rendered":"Exposici\u00f3n de Informaci\u00f3n Sensible en CGC Maintenance Mode <= 1.2"},"content":{"rendered":"
El plugin CGC Maintenance Mode para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n sensible en todas las versiones hasta, e incluyendo, la 1.2 a trav\u00e9s de la API REST. Esto permite que atacantes no autenticados puedan ver publicaciones protegidas a trav\u00e9s de la API REST incluso cuando el modo de mantenimiento est\u00e1 activado.<\/div>\n

<\/p>\n

Los usuarios afectados por esta vulnerabilidad deben tomar medidas inmediatas para proteger la informaci\u00f3n sensible de sus sitios web. Una soluci\u00f3n temporal ser\u00eda desactivar el plugin CGC Maintenance Mode y buscar una alternativa segura en el repositorio oficial de WordPress. Tambi\u00e9n se recomienda mantener el plugin y WordPress actualizados para evitar posibles explotaciones de vulnerabilidades en el futuro.<\/div>\n
Es crucial que los administradores de sitios web est\u00e9n al tanto de las vulnerabilidades en los plugins que utilizan y tomen las medidas necesarias para proteger la seguridad de sus sitios. La exposici\u00f3n de informaci\u00f3n sensible puede tener consecuencias graves, por lo que es importante actuar r\u00e1pidamente para mitigar este riesgo en particular.<\/div>\n","protected":false},"excerpt":{"rendered":"

El plugin CGC Maintenance Mode para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n sensible en todas las versiones hasta, e incluyendo, la 1.2 a trav\u00e9s de la API REST. Esto permite que atacantes no autenticados puedan ver publicaciones protegidas a trav\u00e9s de la API REST incluso cuando el modo de mantenimiento est\u00e1 activado. Los […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1138],"class_list":["post-3428","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-1418"],"yoast_head":"\nExposici\u00f3n de Informaci\u00f3n Sensible en CGC Maintenance Mode <= 1.2 - SeguridadWordPress.es<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exposici\u00f3n de Informaci\u00f3n Sensible en CGC Maintenance Mode <= 1.2 - SeguridadWordPress.es\" \/>\n<meta property=\"og:description\" content=\"El plugin CGC Maintenance Mode para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n sensible en todas las versiones hasta, e incluyendo, la 1.2 a trav\u00e9s de la API REST. Esto permite que atacantes no autenticados puedan ver publicaciones protegidas a trav\u00e9s de la API REST incluso cuando el modo de mantenimiento est\u00e1 activado. Los […]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/\" \/>\n<meta property=\"og:site_name\" content=\"SeguridadWordPress.es\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-03T17:45:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/\",\"url\":\"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/\",\"name\":\"Exposici\u00f3n de Informaci\u00f3n Sensible en CGC Maintenance Mode <= 1.2 - SeguridadWordPress.es\",\"isPartOf\":{\"@id\":\"http:\/\/127.0.0.1\/#website\"},\"datePublished\":\"2024-04-03T17:45:13+00:00\",\"dateModified\":\"2024-04-03T17:45:13+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/127.0.0.1\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exposici\u00f3n de Informaci\u00f3n Sensible en CGC Maintenance Mode <= 1.2\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/127.0.0.1\/#website\",\"url\":\"http:\/\/127.0.0.1\/\",\"name\":\"SeguridadWordPress.es\",\"description\":\"Recopilaci\u00f3n de vulnerabilidades WordPress.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/127.0.0.1\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exposici\u00f3n de Informaci\u00f3n Sensible en CGC Maintenance Mode <= 1.2 - SeguridadWordPress.es","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/","og_locale":"en_US","og_type":"article","og_title":"Exposici\u00f3n de Informaci\u00f3n Sensible en CGC Maintenance Mode <= 1.2 - SeguridadWordPress.es","og_description":"El plugin CGC Maintenance Mode para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n sensible en todas las versiones hasta, e incluyendo, la 1.2 a trav\u00e9s de la API REST. Esto permite que atacantes no autenticados puedan ver publicaciones protegidas a trav\u00e9s de la API REST incluso cuando el modo de mantenimiento est\u00e1 activado. Los […]","og_url":"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/","og_site_name":"SeguridadWordPress.es","article_published_time":"2024-04-03T17:45:13+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/","url":"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/","name":"Exposici\u00f3n de Informaci\u00f3n Sensible en CGC Maintenance Mode <= 1.2 - SeguridadWordPress.es","isPartOf":{"@id":"http:\/\/127.0.0.1\/#website"},"datePublished":"2024-04-03T17:45:13+00:00","dateModified":"2024-04-03T17:45:13+00:00","author":{"@id":""},"breadcrumb":{"@id":"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/127.0.0.1\/exposicion-de-informacion-sensible-en-cgc-maintenance-mode-1-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/127.0.0.1\/"},{"@type":"ListItem","position":2,"name":"Exposici\u00f3n de Informaci\u00f3n Sensible en CGC Maintenance Mode <= 1.2"}]},{"@type":"WebSite","@id":"http:\/\/127.0.0.1\/#website","url":"http:\/\/127.0.0.1\/","name":"SeguridadWordPress.es","description":"Recopilaci\u00f3n de vulnerabilidades WordPress.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/127.0.0.1\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"amp_enabled":true,"_links":{"self":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/3428"}],"collection":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=3428"}],"version-history":[{"count":0,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/3428\/revisions"}],"wp:attachment":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=3428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/categories?post=3428"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/tags?post=3428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}