Lucene search

K
nvd[email protected]NVD:CVE-2024-6641
HistorySep 18, 2024 - 6:15 a.m.

CVE-2024-6641

2024-09-1806:15:02
CWE-697
CWE-185
web.nvd.nist.gov
4
wordpress
security feature bypass
vulnerability

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

17.8%

The WP Hardening – Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the “Stop User Enumeration” feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames.

Affected configurations

Nvd
Node
getastrawp_hardeningRange<1.2.7wordpress
VendorProductVersionCPE
getastrawp_hardening*cpe:2.3:a:getastra:wp_hardening:*:*:*:*:*:wordpress:*:*

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

17.8%

Related for NVD:CVE-2024-6641