Lucene search

K
cvelistWordfenceCVELIST:CVE-2024-6641
HistorySep 18, 2024 - 5:31 a.m.

CVE-2024-6641 WP Hardening – Fix Your WordPress Security <= 1.2.6 - Unauthenticated Security Feature Bypass to Username Enumeration

2024-09-1805:31:13
CWE-185
Wordfence
www.cve.org
2
cve-2024-6641; wordpress; security feature bypass; username enumeration; regular expression; unauthenticated attackers; site usernames

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

17.8%

The WP Hardening – Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the “Stop User Enumeration” feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames.

CNA Affected

[
  {
    "vendor": "astrasecuritysuite",
    "product": "WP Hardening (discontinued)",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.2.6",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

17.8%

Related for CVELIST:CVE-2024-6641