CVE-2024-7630

The Relevanssi – A Better Search plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.22.2 via the relevanssi_do_query() due to insufficient limitations on the posts that are returned when searching. This makes it possible for unauthenticated attackers to extract potentially sensitive information from password protected posts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:relevanssi:relevanssi:*:*:*:*:*:wordpress:*:*

History

29 Jan 2025, 16:22

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:relevanssi:relevanssi:*:*:*:*:*:wordpress:*:*
First Time Relevanssi relevanssi
Relevanssi
References () https://plugins.trac.wordpress.org/changeset/3134753/relevanssi/trunk/lib/common.php - () https://plugins.trac.wordpress.org/changeset/3134753/relevanssi/trunk/lib/common.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/3fa78f4e-ede2-4863-a2d7-99bd8c7b5912?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/3fa78f4e-ede2-4863-a2d7-99bd8c7b5912?source=cve - Third Party Advisory

Information

Published : 2024-08-16 03:15

Updated : 2025-01-29 16:22


NVD link : CVE-2024-7630

Mitre link : CVE-2024-7630

CVE.ORG link : CVE-2024-7630


JSON object : View

Products Affected

relevanssi

  • relevanssi
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo