Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-1380 β€” AI Deep Analysis Summary

CVSS 5.3 Β· Medium

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical authorization flaw in the Relevanssi plugin. πŸ“‰ **Consequences**: Unauthenticated attackers can export sensitive query logs, exposing user search history and potential internal data structures.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-862** (Missing Authorization). The function `relevanssi_export_log_check()` lacks a proper capability check.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin **Relevanssi** (Premium & Free). πŸ“… **Versions**: 4.22.0 and earlier. If you are running any version ≀ 4.22.0, you are vulnerable! ⚠️

Q4What can hackers do? (Privileges/Data)

πŸ’» **Attacker Actions**: Export the **Query Log Data**. πŸ•΅οΈβ€β™‚οΈ This includes search terms entered by users, which can reveal sensitive business logic, internal page structures, or personal user data. No login required!

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **LOW**. ⚑ **Auth**: None required (Unauthenticated). 🌐 **Network**: Remote (AV:N). πŸ–±οΈ **UI**: None needed. It’s a simple API call away for any attacker on the internet.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’₯ **Public Exploit**: **YES**. πŸ“‚ PoC available on GitHub (RandomRobbieBF) and Nuclei templates. πŸš€ Wild exploitation is highly likely since the mechanism is straightforward and documented.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for the Relevanssi plugin version. πŸ§ͺ Use Nuclei templates (`CVE-2024-1380.yaml`) to test for the missing authorization on the export endpoint.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ”§ **Official Fix**: The vendor has acknowledged the issue. πŸ“’ They indicated they may add a capability check. πŸ”„ **Action**: Update to the latest version immediately if a patch is released.…

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable the **Log Export** feature if possible. 🚫 Restrict access to the WordPress admin area via IP whitelisting. πŸ›‘οΈ Use a WAF to block requests to the specific export endpoint.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. 🚨 CVSS Score: **5.3** (Medium) but impact is high due to unauthenticated access. πŸ“‰ Data privacy risk is significant. Patch immediately or apply mitigations to prevent data leakage!