-
CVSS Score
-The vulnerability stems from improper handling of the 'user_pass' property in user data retrieval. The advisory explicitly states the core issue is that 'user_pass' wasn't treated as a special case in a $current_user->get($property) call. In WordPress user objects, get() typically returns stored user meta including sensitive fields. The GFCommon::get_user_property function (or equivalent user data handler in common.php) would be responsible for this property retrieval. The lack of filtering for 'user_pass' before version 2.4.9 allowed this sensitive field to be leaked through Gravity Forms' user data handling mechanisms.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| wp-premium/gravityforms | composer | < 2.4.9 | 2.4.9 |