The Relevanssi – A Better Search plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the relevanssi_update_counts() function in all versions up to, and including, 4.22.1. This makes it possible for unauthenticated attackers to execute expensive queries on the application that could lead into DOS.
References
Configurations
History
04 Feb 2025, 17:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.2 |
CPE | cpe:2.3:a:relevanssi:relevanssi:*:*:*:*:*:wordpress:*:* | |
First Time |
Relevanssi
Relevanssi relevanssi |
|
CWE | CWE-862 | |
References | () https://plugins.trac.wordpress.org/changeset/3064304/relevanssi/tags/4.22.2/lib/admin-ajax.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/e625130f-8e21-4baf-9d3c-4cbb806b9e52?source=cve - Third Party Advisory | |
References | () https://plugins.trac.wordpress.org/browser/relevanssi/trunk/lib/admin-ajax.php#L443 - Patch |
09 Apr 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-09 19:15
Updated : 2025-02-04 17:32
NVD link : CVE-2024-3213
Mitre link : CVE-2024-3213
JSON object : View
Products Affected
relevanssi
- relevanssi
CWE
CWE-862
Missing Authorization