CVE-2024-13926

The WP-Syntax WordPress plugin through 1.2 does not properly handle input, allowing an attacker to create a post containing a large number of tags, thereby exploiting a catastrophic backtracking issue in the regular expression processing to cause a DoS.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:connections-pro:wp-syntax:*:*:*:*:*:wordpress:*:*

History

28 May 2025, 15:50

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/b5f0092e-7cd5-412f-a8ea-7bd4a8bf86d2/ - () https://wpscan.com/vulnerability/b5f0092e-7cd5-412f-a8ea-7bd4a8bf86d2/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:connections-pro:wp-syntax:*:*:*:*:*:wordpress:*:*
First Time Connections-pro
Connections-pro wp-syntax
Summary
  • (es) El complemento WP-Syntax para WordPress hasta la versión 1.2 no gestiona adecuadamente la entrada, lo que permite que un atacante cree una publicación que contenga una gran cantidad de etiquetas, explotando así un problema de retroceso catastrófico en el procesamiento de expresiones regulares para provocar un DoS.
CWE CWE-1333

21 Apr 2025, 03:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

19 Apr 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-19 06:15

Updated : 2025-05-28 15:50


NVD link : CVE-2024-13926

Mitre link : CVE-2024-13926

CVE.ORG link : CVE-2024-13926


JSON object : View

Products Affected

connections-pro

  • wp-syntax
CWE
CWE-1333

Inefficient Regular Expression Complexity