Lucene search

K
vulnrichmentWordfenceVULNRICHMENT:CVE-2024-6641
HistorySep 18, 2024 - 5:31 a.m.

CVE-2024-6641 WP Hardening – Fix Your WordPress Security <= 1.2.6 - Unauthenticated Security Feature Bypass to Username Enumeration

2024-09-1805:31:13
CWE-185
Wordfence
github.com
2
cve-2024-6641
wordpress
unauthenticated security

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

17.8%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

The WP Hardening – Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the “Stop User Enumeration” feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:getastra:wp_hardening:*:*:*:*:*:wordpress:*:*"
    ],
    "vendor": "getastra",
    "product": "wp_hardening",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "semver",
        "lessThanOrEqual": "1.2.6"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

17.8%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-6641