cve/2024/CVE-2024-7630.md

18 lines
917 B
Markdown
Raw Normal View History

2024-08-17 18:41:15 +00:00
### [CVE-2024-7630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7630)
![](https://img.shields.io/static/v1?label=Product&message=Relevanssi%20%E2%80%93%20A%20Better%20Search&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%204.22.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Exposure&color=brighgreen)
### Description
The Relevanssi A Better Search plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.22.2 via the relevanssi_do_query() due to insufficient limitations on the posts that are returned when searching. This makes it possible for unauthenticated attackers to extract potentially sensitive information from password protected posts.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates