9.8
CVE-2024-3214
- EPSS 1.84%
- Veröffentlicht 09.04.2024 19:15:40
- Zuletzt bearbeitet 28.01.2025 21:03:01
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Relevanssi – A Better Search <= 4.22.1 - Unauthenticated Second Order CSV Injection
The Relevanssi – A Better Search plugin for WordPress is vulnerable to CSV Injection in all versions up to, and including, 4.22.1. This makes it possible for unauthenticated attackers to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
Mögliche Gegenmaßnahme
Relevanssi – A Better Search: Update to version 4.22.2, or a newer patched version
Relevanssi Premium: Update to version 2.25.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Relevanssi – A Better Search
Version
*-4.22.1
SystemWordPress Plugin
≫
Produkt
Relevanssi Premium
Version
*-2.25.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Relevanssi ≫ Relevanssi SwPlatformwordpress Version < 4.22.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.84% | 0.824 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| security@wordfence.com | 5.8 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
|
CWE-1236 Improper Neutralization of Formula Elements in a CSV File
The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by a spreadsheet product.