Логотип exploitDog
bind:CVE-2024-11638
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-11638

Количество 2

Количество 2

nvd логотип

CVE-2024-11638

11 месяцев назад

The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-wrxx-v2cm-rh9h

11 месяцев назад

The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-11638

The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies.

CVSS3: 8.8
0%
Низкий
11 месяцев назад
github логотип
GHSA-wrxx-v2cm-rh9h

The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies.

CVSS3: 8.8
0%
Низкий
11 месяцев назад

Уязвимостей на страницу