The WP Hardening – Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the "Stop User Enumeration" feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-697 |
Wed, 18 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Getastra
Getastra wp Hardening |
|
CPEs | cpe:2.3:a:getastra:wp_hardening:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Getastra
Getastra wp Hardening |
|
Metrics |
ssvc
|
Wed, 18 Sep 2024 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WP Hardening – Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the "Stop User Enumeration" feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames. | |
Title | WP Hardening – Fix Your WordPress Security <= 1.2.6 - Unauthenticated Security Feature Bypass to Username Enumeration | |
Weaknesses | CWE-185 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-09-18T05:31:13.844Z
Updated: 2024-09-18T15:04:25.453Z
Reserved: 2024-07-10T00:52:55.526Z
Link: CVE-2024-6641
Vulnrichment
Updated: 2024-09-18T15:04:21.546Z
NVD
Status : Analyzed
Published: 2024-09-18T06:15:02.490
Modified: 2024-09-25T19:07:40.013
Link: CVE-2024-6641
Redhat
No data.