CVE Vulnerabilities

CVE-2024-6641

Incorrect Regular Expression

Published: Sep 18, 2024 | Modified: Sep 25, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

The WP Hardening – Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the Stop User Enumeration feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames.

Weakness

The product specifies a regular expression in a way that causes data to be improperly matched or compared.

Affected Software

Name Vendor Start Version End Version
Wp_hardening Getastra * 1.2.7 (excluding)

Potential Mitigations

References