The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies.
History

Wed, 21 May 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Gtbabel
Gtbabel gtbabel
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:gtbabel:gtbabel:*:*:*:*:*:wordpress:*:*
Vendors & Products Gtbabel
Gtbabel gtbabel

Mon, 10 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 10 Mar 2025 06:15:00 +0000

Type Values Removed Values Added
Description The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies.
Title Gtbabel < 6.6.9 - Unauthenticated Admin Account Takeover
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-03-10T14:17:07.290Z

Reserved: 2024-11-22T18:27:28.676Z

Link: CVE-2024-11638

cve-icon Vulnrichment

Updated: 2025-03-10T14:16:49.997Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-10T06:15:20.797

Modified: 2025-05-21T16:44:34.700

Link: CVE-2024-11638

cve-icon Redhat

No data.