Lucene search

K
cveWordfenceCVE-2024-6641
HistorySep 18, 2024 - 6:15 a.m.

CVE-2024-6641

2024-09-1806:15:02
CWE-185
CWE-697
Wordfence
web.nvd.nist.gov
24
wp hardening
wordpress
security feature bypass
incorrect regular expression
stop user enumeration
unauthenticated attackers
security restrictions
site usernames

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.3

Confidence

High

EPSS

0.001

Percentile

17.8%

The WP Hardening – Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the “Stop User Enumeration” feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames.

Affected configurations

Nvd
Vulners
Vulnrichment
Node
getastrawp_hardeningRange<1.2.7wordpress
VendorProductVersionCPE
getastrawp_hardening*cpe:2.3:a:getastra:wp_hardening:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "astrasecuritysuite",
    "product": "WP Hardening (discontinued)",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.2.6",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.3

Confidence

High

EPSS

0.001

Percentile

17.8%

Related for CVE-2024-6641