First published: Tue Apr 09 2024(Updated: )
The Relevanssi – A Better Search plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the relevanssi_update_counts() function in all versions up to, and including, 4.22.1. This makes it possible for unauthenticated attackers to execute expensive queries on the application that could lead into DOS.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Relevanssi | <=4.22.1 | |
Relevanssi | <4.22.2 |
https://plugins.trac.wordpress.org/changeset/3064304/relevanssi/tags/4.22.2/lib/admin-ajax.php
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3213 has a high severity due to the potential for unauthorized modification of data by unauthenticated attackers.
To mitigate CVE-2024-3213, update the Relevanssi – A Better Search plugin to version 4.22.2 or later.
CVE-2024-3213 affects all versions of the Relevanssi – A Better Search plugin up to and including version 4.22.1.
CVE-2024-3213 allows unauthenticated attackers to execute potentially expensive database operations due to missing capability checks.
CVE-2024-3213 is a remote vulnerability that can be exploited without local access to the affected WordPress site.