CVE-2024-13896

The WP-GeSHi-Highlight — rock-solid syntax highlighting for 259 languages WordPress plugin through 1.4.3 processes user-supplied input as a regular expression via the wp_geshi_filter_replace_code() function, which could lead to Regular Expression Denial of Service (ReDoS) issue
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:jgehrcke:wp-geshi-highlight:*:*:*:*:*:wordpress:*:*

History

15 May 2025, 20:55

Type Values Removed Values Added
CWE CWE-1333
References () https://wpscan.com/vulnerability/b8b622ea-e090-45ad-8755-b050fc055231/ - () https://wpscan.com/vulnerability/b8b622ea-e090-45ad-8755-b050fc055231/ - Exploit, Third Party Advisory
First Time Jgehrcke wp-geshi-highlight
Jgehrcke
CPE cpe:2.3:a:jgehrcke:wp-geshi-highlight:*:*:*:*:*:wordpress:*:*

10 Apr 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-10 07:15

Updated : 2025-05-15 20:55


NVD link : CVE-2024-13896

Mitre link : CVE-2024-13896


JSON object : View

Products Affected

jgehrcke

  • wp-geshi-highlight
CWE
CWE-1333

Inefficient Regular Expression Complexity