{"id":"CVE-2024-1995","details":"The Smart Custom Fields plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the relational_posts_search() function in all versions up to, and including, 4.2.2. This makes it possible for authenticated attackers, with subscrber-level access and above, to retrieve post content that is password protected and/or private.","modified":"2026-03-13T22:53:43.001370Z","published":"2024-03-20T02:15:08.500Z","references":[{"type":"WEB","url":"https://plugins.trac.wordpress.org/browser/smart-custom-fields/trunk/classes/fields/class.field-related-posts.php#L78"},{"type":"WEB","url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3052172%40smart-custom-fields&new=3052172%40smart-custom-fields&sfp_email=&sfph_mail="},{"type":"WEB","url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/e966a266-4265-4a72-8a50-e872805219a7?source=cve"},{"type":"FIX","url":"https://github.com/inc2734/smart-custom-fields/commit/67cb6d75bd8189668f721dbd2dc7a3036851be1b"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/inc2734/smart-custom-fields","events":[{"introduced":"0"},{"fixed":"67cb6d75bd8189668f721dbd2dc7a3036851be1b"}]},{"type":"GIT","repo":"https://github.com/inc2734/smart-custom-fields","events":[{"introduced":"0"},{"fixed":"67cb6d75bd8189668f721dbd2dc7a3036851be1b"}]}],"versions":["1.0.0","1.0.1","1.0.2","1.0.3","1.1.0","1.1.1","1.1.2","1.1.3","1.2.0","1.2.1","1.2.2","1.3.0","1.3.0b","1.3.1","1.3.2","1.4.0","1.5.0","1.5.1","1.5.2","1.5.3","1.6.0","1.6.1","1.6.2","1.6.3","1.6.4","1.6.5","1.6.6","1.6.7","1.7.0","2.0.0","2.1.0","2.1.1","2.2.0","2.2.1","2.2.2","2.2.3","2.3.0","3.0.0","3.0.1","3.1.0","3.1.1","3.1.2","3.1.3","3.1.4","3.1.5","3.1.6","3.1.7","4.0.0","4.0.1","4.0.2","4.1.0","4.1.2","4.1.3","4.1.4","4.1.5","4.2.0","4.2.1","4.2.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-1995.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}