Relevanssi 漏洞列表
共找到 5 个与 Relevanssi 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2024-1380: Relevanssi (A Better Search) <= 4.22.0 - Query Log Export POC
The Relevanssi Search plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check in all versions up to, and including, 4.22.0. This makes it possible for unauthenticated attackers to export the query log data. -
CVE-2025-4396: Relevanssi <= 4.24.4 (Free) - Unauthenticated SQL Injection POC
The Relevanssi – A Better Search plugin for WordPress is vulnerable to time-based SQL Injection via the cats and tags query parameters in all versions up to, and including, 4.24.4 (Free) and <= 2.27.4 (Premium) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries to already existing queries that can be used to extract sensitive information from the database. -
CVE-2024-1380: Relevanssi (A Better Search) <= 4.22.0 - Query Log Export POC
The Relevanssi Search plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check in all versions up to, and including, 4.22.0. This makes it possible for unauthenticated attackers to export the query log data. -
CVE-2025-4396: Relevanssi <= 4.24.4 (Free) - Unauthenticated SQL Injection POC
The Relevanssi – A Better Search plugin for WordPress is vulnerable to time-based SQL Injection via the cats and tags query parameters in all versions up to, and including, 4.24.4 (Free) and <= 2.27.4 (Premium) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries to already existing queries that can be used to extract sensitive information from the database. -
WordPress Relevanssi /wp-admin/admin-ajax.php 未授权访问漏洞(CVE-2024-1380) 无POC
Relevanssi 是一款用于 WordPress 的搜索插件。该漏洞存在于 Relevanssi 插件的所有版本(包括 4.22.0),由于缺少权限检查,攻击者可以在未授权的情况下导出查询日志数据。这可能导致敏感信息泄露,例如用户 ID 和会话 ID。