Vulnerability Details CVE-2024-11638
The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 24.1%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2024-11638
-
cpe:2.3:a:gtbabel:gtbabel:2.4.5
-
cpe:2.3:a:gtbabel:gtbabel:2.4.6
-
cpe:2.3:a:gtbabel:gtbabel:2.4.8
-
cpe:2.3:a:gtbabel:gtbabel:2.5.8
-
cpe:2.3:a:gtbabel:gtbabel:2.7.3
-
cpe:2.3:a:gtbabel:gtbabel:2.8.2
-
cpe:2.3:a:gtbabel:gtbabel:3.0.3
-
cpe:2.3:a:gtbabel:gtbabel:3.2.7
-
cpe:2.3:a:gtbabel:gtbabel:3.4.8
-
cpe:2.3:a:gtbabel:gtbabel:3.7.4
-
cpe:2.3:a:gtbabel:gtbabel:3.8.7