The Minify HTML plugin for WordPress is vulnerable to Regular Expression Denial of Service (ReDoS) in all versions up to, and including, 2.1.10. This is due to processing user-supplied input as a regular expression. This makes it possible for unauthenticated attackers to create comments that can cause catastrophic backtracking and break pages.
History

Mon, 16 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Dec 2024 04:45:00 +0000

Type Values Removed Values Added
Description The Minify HTML plugin for WordPress is vulnerable to Regular Expression Denial of Service (ReDoS) in all versions up to, and including, 2.1.10. This is due to processing user-supplied input as a regular expression. This makes it possible for unauthenticated attackers to create comments that can cause catastrophic backtracking and break pages.
Title Minify HTML <= 2.1.10 - - Regular Expressions Denial of Service
Weaknesses CWE-400
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-12-13T04:23:26.470Z

Updated: 2024-12-16T16:42:12.138Z

Reserved: 2024-12-12T15:59:19.104Z

Link: CVE-2024-12579

cve-icon Vulnrichment

Updated: 2024-12-16T15:59:45.507Z

cve-icon NVD

Status : Received

Published: 2024-12-13T05:15:07.473

Modified: 2024-12-13T05:15:07.473

Link: CVE-2024-12579

cve-icon Redhat

No data.