
Cloud Vulnerability DB
A community-led vulnerabilities database
The Majestic Support WordPress plugin (versions up to 1.0.5) contains a Sensitive Information Exposure vulnerability (CVE-2024-13600). The vulnerability was discovered and reported by Wordfence, with the initial disclosure on February 12, 2025. This security flaw affects the plugin's 'majesticsupportdata' directory functionality (Wordfence Advisory).
The vulnerability exists in the handling of file attachments within the /wp-content/uploads/majesticsupportdata directory. The issue stems from insecure storage of sensitive data in this directory, which can be accessed by unauthenticated users. The vulnerability has received a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating high confidentiality impact with network-based attack vector requiring no privileges or user interaction (NVD).
The vulnerability allows unauthenticated attackers to access and extract sensitive data stored in the support tickets' file attachments. This could lead to exposure of confidential information submitted through the support system (Wordfence Advisory).
A patch has been released to address this vulnerability. Users are advised to update to version 1.0.6 or later of the Majestic Support plugin (WordPress Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."