Vulnerability Description
The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gtbabel | Gtbabel | < 6.6.9 |
References
- https://wpscan.com/vulnerability/2f20336f-e12e-4b09-bcaf-45f7249f6495/ExploitThird Party Advisory
FAQ
What is CVE-2024-11638?
CVE-2024-11638 is a vulnerability with a CVSS score of 8.8 (HIGH). The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such ...
How severe is CVE-2024-11638?
CVE-2024-11638 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-11638?
Check the references section above for vendor advisories and patch information. Affected products include: Gtbabel Gtbabel.