5.3

CVE-2023-7199

Exploit

Relevanssi <= 4.21.2 (Free) and < 2.25.0 (Premium) - Missing Authorization to Unauthorized Post Access

The Relevanssi WordPress plugin before 4.22.0, Relevanssi Premium WordPress plugin before 2.25.0 allows any unauthenticated user to read draft and private posts via a crafted request
Mögliche Gegenmaßnahme
Relevanssi – A Better Search: Update to version 4.22.0, or a newer patched version
Relevanssi Premium: Update to version 2.25.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Relevanssi – A Better Search
Version *-4.21.2
SystemWordPress Plugin
Produkt Relevanssi Premium
Version [*, 2.25.0)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
RelevanssiRelevanssi SwPlatformwordpress Version <= 2.25.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.44% 0.627
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
134c704f-9b21-4f2e-91b3-4a467353bcc0 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-639 Authorization Bypass Through User-Controlled Key

The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.