CVE-2024-11638

The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:gtbabel:gtbabel:*:*:*:*:*:wordpress:*:*

History

21 May 2025, 16:44

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:gtbabel:gtbabel:*:*:*:*:*:wordpress:*:*
Summary
  • (es) El complemento Gtbabel para WordPress anterior a la versión 6.6.9 no garantiza que la URL para realizar el análisis de código pertenezca al blog, lo que podría permitir a atacantes no autenticados recuperar las cookies de un usuario que haya iniciado sesión (como el administrador) haciéndoles abrir una URL manipulada ya que la solicitud realizada para analizar la URL contiene dichas cookies.
First Time Gtbabel gtbabel
Gtbabel
References () https://wpscan.com/vulnerability/2f20336f-e12e-4b09-bcaf-45f7249f6495/ - () https://wpscan.com/vulnerability/2f20336f-e12e-4b09-bcaf-45f7249f6495/ - Exploit, Third Party Advisory

10 Mar 2025, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

10 Mar 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-10 06:15

Updated : 2025-05-21 16:44


NVD link : CVE-2024-11638

Mitre link : CVE-2024-11638

CVE.ORG link : CVE-2024-11638


JSON object : View

Products Affected

gtbabel

  • gtbabel