First published: Fri Aug 16 2024(Updated: )
The Relevanssi – A Better Search plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.22.2 via the relevanssi_do_query() due to insufficient limitations on the posts that are returned when searching. This makes it possible for unauthenticated attackers to extract potentially sensitive information from password protected posts.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Relevanssi | <4.23.0 | |
Relevanssi | <=4.22.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7630 is considered a moderate severity vulnerability due to the risk of information exposure.
To fix CVE-2024-7630, update the Relevanssi plugin to version 4.23.0 or later.
CVE-2024-7630 affects all versions of the Relevanssi plugin up to and including 4.22.2.
CVE-2024-7630 is an information exposure vulnerability that allows unauthorized access to search results.
The impact of CVE-2024-7630 includes potential unauthorized users being able to access sensitive post information.