The WP-Syntax WordPress plugin through 1.2 does not properly handle input, allowing an attacker to create a post containing a large number of tags, thereby exploiting a catastrophic backtracking issue in the regular expression processing to cause a DoS.
History

Wed, 28 May 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Connections-pro
Connections-pro wp-syntax
Weaknesses CWE-1333
CPEs cpe:2.3:a:connections-pro:wp-syntax:*:*:*:*:*:wordpress:*:*
Vendors & Products Connections-pro
Connections-pro wp-syntax

Mon, 21 Apr 2025 03:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 19 Apr 2025 06:15:00 +0000

Type Values Removed Values Added
Title WP-Syntax <= 1.2 - Author+ Potential ReDoS

Sat, 19 Apr 2025 06:45:00 +0000

Type Values Removed Values Added
Description The WP-Syntax WordPress plugin through 1.2 does not properly handle input, allowing an attacker to create a post containing a large number of tags, thereby exploiting a catastrophic backtracking issue in the regular expression processing to cause a DoS.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-04-19T06:00:02.350Z

Updated: 2025-04-21T02:38:26.459Z

Reserved: 2025-03-13T12:47:07.627Z

Link: CVE-2024-13926

cve-icon Vulnrichment

Updated: 2025-04-21T02:38:15.258Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-19T06:15:18.347

Modified: 2025-05-28T15:50:23.510

Link: CVE-2024-13926

cve-icon Redhat

No data.