The WP Hardening – Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the "Stop User Enumeration" feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 25 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-697 |
Wed, 18 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getastra
Getastra wp Hardening |
|
| CPEs | cpe:2.3:a:getastra:wp_hardening:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Getastra
Getastra wp Hardening |
|
| Metrics |
ssvc
|
Wed, 18 Sep 2024 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WP Hardening – Fix Your WordPress Security plugin for WordPress is vulnerable to Security Feature Bypass in all versions up to, and including, 1.2.6. This is due to use of an incorrect regular expression within the "Stop User Enumeration" feature. This makes it possible for unauthenticated attackers to bypass intended security restrictions and expose site usernames. | |
| Title | WP Hardening – Fix Your WordPress Security <= 1.2.6 - Unauthenticated Security Feature Bypass to Username Enumeration | |
| Weaknesses | CWE-185 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-09-18T05:31:13.844Z
Updated: 2024-09-18T15:04:25.453Z
Reserved: 2024-07-10T00:52:55.526Z
Link: CVE-2024-6641
Updated: 2024-09-18T15:04:21.546Z
Status : Analyzed
Published: 2024-09-18T06:15:02.490
Modified: 2024-09-25T19:07:40.013
Link: CVE-2024-6641
No data.