The WP Hardening – Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the "Stop User Enumeration" feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames.
History

Wed, 18 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Getastra
Getastra wp Hardening
CPEs cpe:2.3:a:getastra:wp_hardening:*:*:*:*:*:wordpress:*:*
Vendors & Products Getastra
Getastra wp Hardening
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Sep 2024 05:45:00 +0000

Type Values Removed Values Added
Description The WP Hardening – Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the "Stop User Enumeration" feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames.
Title WP Hardening – Fix Your WordPress Security <= 1.2.6 - Unauthenticated Security Feature Bypass to Username Enumeration
Weaknesses CWE-185
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-09-18T05:31:13.844Z

Updated: 2024-09-18T15:04:25.453Z

Reserved: 2024-07-10T00:52:55.526Z

Link: CVE-2024-6641

cve-icon Vulnrichment

Updated: 2024-09-18T15:04:21.546Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-18T06:15:02.490

Modified: 2024-09-20T12:30:51.220

Link: CVE-2024-6641

cve-icon Redhat

No data.