The Relevanssi – A Better Search plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the relevanssi_update_counts() function in all versions up to, and including, 4.22.1. This makes it possible for unauthenticated attackers to execute expensive queries on the application that could lead into DOS.
References
Configurations
History
04 Feb 2025, 17:32
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-862 | |
References | () https://plugins.trac.wordpress.org/browser/relevanssi/trunk/lib/admin-ajax.php#L443 - Patch | |
References | () https://plugins.trac.wordpress.org/changeset/3064304/relevanssi/tags/4.22.2/lib/admin-ajax.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/e625130f-8e21-4baf-9d3c-4cbb806b9e52?source=cve - Third Party Advisory | |
First Time |
Relevanssi relevanssi
Relevanssi |
|
CPE | cpe:2.3:a:relevanssi:relevanssi:*:*:*:*:*:wordpress:*:* |
Information
Published : 2024-04-09 19:15
Updated : 2025-02-04 17:32
NVD link : CVE-2024-3213
Mitre link : CVE-2024-3213
CVE.ORG link : CVE-2024-3213
JSON object : View
Products Affected
relevanssi
- relevanssi
CWE
CWE-862
Missing Authorization