The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies.
Metrics
Affected Vendors & Products
References
History
Wed, 21 May 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gtbabel
Gtbabel gtbabel |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:gtbabel:gtbabel:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Gtbabel
Gtbabel gtbabel |
Mon, 10 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Mon, 10 Mar 2025 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies. | |
Title | Gtbabel < 6.6.9 - Unauthenticated Admin Account Takeover | |
References |
|

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-03-10T14:17:07.290Z
Reserved: 2024-11-22T18:27:28.676Z
Link: CVE-2024-11638

Updated: 2025-03-10T14:16:49.997Z

Status : Analyzed
Published: 2025-03-10T06:15:20.797
Modified: 2025-05-21T16:44:34.700
Link: CVE-2024-11638

No data.