Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3228: CWE-200 Information Exposure in wpkube Social Sharing Plugin – Kiwi

0
Medium
VulnerabilityCVE-2024-3228cvecve-2024-3228cwe-200
Published: Tue Jul 09 2024 (07/09/2024, 08:33:07 UTC)
Source: CVE Database V5
Vendor/Project: wpkube
Product: Social Sharing Plugin – Kiwi

Description

CVE-2024-3228 is an information exposure vulnerability in the Social Sharing Plugin – Kiwi for WordPress, affecting all versions up to 2. 1. 7. The flaw allows unauthenticated attackers to access limited content from password-protected posts via the 'kiwi-nw-pinterest' class. This vulnerability does not require user interaction or authentication and has a CVSS score of 5. 3 (medium severity). While it does not impact integrity or availability, it compromises confidentiality by exposing restricted content. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized content disclosure. Countries with significant WordPress usage and high adoption of this plugin are at greater risk, including the United States, Germany, United Kingdom, Canada, Australia, and India.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:07:39 UTC

Technical Analysis

CVE-2024-3228 is a medium severity information exposure vulnerability identified in the Social Sharing Plugin – Kiwi for WordPress, specifically affecting all versions up to and including 2.1.7. The vulnerability arises from improper handling of the 'kiwi-nw-pinterest' CSS class, which inadvertently allows unauthenticated attackers to view limited content from password-protected posts. This exposure occurs because the plugin fails to enforce proper access controls on certain content elements rendered via this class, bypassing WordPress's native password protection mechanisms. The vulnerability is classified under CWE-200 (Information Exposure), indicating that sensitive information is disclosed to unauthorized parties. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) highlights that the attack can be performed remotely over the network without any privileges or user interaction, and the impact is limited to confidentiality loss without affecting integrity or availability. No patches or fixes are currently linked, and no exploits have been reported in the wild, but the vulnerability's presence in a widely used WordPress plugin makes it a notable risk for website operators relying on this plugin for social sharing features.

Potential Impact

The primary impact of CVE-2024-3228 is the unauthorized disclosure of content intended to be protected by password restrictions on WordPress sites using the Social Sharing Plugin – Kiwi. This can lead to leakage of sensitive or confidential information, undermining the privacy controls set by site administrators. Although the exposure is limited to partial content and does not allow modification or deletion, the breach of confidentiality can damage user trust, violate privacy policies, and potentially expose proprietary or personal data. Organizations relying on password-protected posts for internal communications, premium content, or sensitive announcements are particularly at risk. The vulnerability's ease of exploitation—requiring no authentication or user interaction—means attackers can automate content scraping at scale. While no known exploits exist yet, the widespread use of WordPress and social sharing plugins increases the likelihood of future exploitation attempts, especially targeting high-value or high-traffic websites.

Mitigation Recommendations

To mitigate CVE-2024-3228, organizations should first verify if they are using the Social Sharing Plugin – Kiwi and identify the version in use. Since no official patch links are currently available, administrators should consider the following practical steps: 1) Temporarily disable or remove the plugin until a security update is released; 2) Restrict access to password-protected posts by implementing additional server-side access controls or custom code to enforce content visibility beyond the plugin's scope; 3) Monitor web server logs for unusual access patterns targeting the 'kiwi-nw-pinterest' class or related endpoints; 4) Educate content creators to avoid placing highly sensitive information in password-protected posts if this plugin is active; 5) Follow the plugin vendor’s communications closely for forthcoming patches or updates; 6) Employ Web Application Firewalls (WAFs) to detect and block suspicious requests attempting to exploit this vulnerability; 7) Conduct regular security audits of WordPress plugins and themes to identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-02T18:14:45.430Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c8eb7ef31ef0b56639c

Added to database: 2/25/2026, 9:41:34 PM

Last enriched: 2/26/2026, 6:07:39 AM

Last updated: 2/26/2026, 9:42:37 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats