Descripción
The Simple History plugin for WordPress is vulnerable to sensitive data exposure via Detective Mode due improper sanitization within the append_debug_info_to_context() function in versions prior 5.8.1. When enabled, plugin’s logger captures entire contents of $_POST (and sometimes raw request bodies or $_GET) without redacting any password‐related keys. As a result, whenever user submits login form, whether native wp_login third‐party widget, their actual password written clear text into logs. An authenticated attacker whose actions generate event will have recorded; an administrator (or anyone with database read access) can then those logs and retrieve every captured password.
https://github.com/bonny/WordPress-Simple-History/commit/68eab0cab6882eafef4bfece884093eeda5ac018
https://github.com/bonny/WordPress-Simple-History/issues/546
https://plugins.trac.wordpress.org/changeset/3267487/
https://simple-history.com/support/detective-mode/
https://wordpress.org/plugins/simple-history/#developers
https://wordpress.org/support/topic/security-vulnerability-passwords-stored-as-plain-text-in-logs/
https://www.wordfence.com/threat-intel/vulnerabilities/id/b6364415-da02-4236-b635-d8fbd27faa33?source=cve