CVE-2024-6641

Sept. 18, 2024, 6:15 a.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

WP Hardening – Fix Your WordPress Security plugin

  • up to 1.2.6

Source

security@wordfence.com

Tags

CVE-2024-6641 details

Published : Sept. 18, 2024, 6:15 a.m.
Last Modified : Sept. 18, 2024, 6:15 a.m.

Description

The WP Hardening – Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the "Stop User Enumeration" feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames.

CVSS Score

1 2 3 4 5.3 6 7 8 9 10

Weakness

Weakness Name Description
CWE-185 Incorrect Regular Expression The product specifies a regular expression in a way that causes data to be improperly matched or compared.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

Base Score

5.3

Exploitability Score

3.9

Impact Score

1.4

Base Severity

MEDIUM

This website uses the NVD API, but is not approved or certified by it.