Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1380: CWE-862 Missing Authorization in msaari Relevanssi – A Better Search

0
Medium
VulnerabilityCVE-2024-1380cvecve-2024-1380cwe-862
Published: Wed Mar 13 2024 (03/13/2024, 15:26:58 UTC)
Source: CVE Database V5
Vendor/Project: msaari
Product: Relevanssi – A Better Search

Description

CVE-2024-1380 is a medium severity vulnerability in the WordPress plugin Relevanssi – A Better Search (all versions up to 4. 22. 0) caused by missing authorization checks in the relevanssi_export_log_check() function. This flaw allows unauthenticated attackers to export query log data without proper permissions, potentially exposing sensitive search queries. The vulnerability does not impact integrity or availability, and no user interaction or authentication is required to exploit it. Although the vendor has indicated plans to add capability checks, the vulnerability is theoretically patched as is, with no known exploits in the wild. Organizations using this plugin should prioritize verifying plugin updates and restricting access to sensitive logs. Countries with significant WordPress usage and large online ecosystems are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 09:29:13 UTC

Technical Analysis

CVE-2024-1380 identifies a missing authorization vulnerability (CWE-862) in the Relevanssi – A Better Search WordPress plugin developed by msaari. The issue resides in the relevanssi_export_log_check() function, which lacks proper capability checks to verify if the requesting user is authorized to export query log data. This omission allows unauthenticated attackers to retrieve search query logs, potentially exposing sensitive user search information or internal data patterns. The vulnerability affects all versions up to and including 4.22.0. The CVSS v3.1 base score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to confidentiality loss, with no integrity or availability effects. The vendor has not yet released a formal patch but has indicated intentions to implement proper authorization checks. Currently, the vulnerability is theoretically patched as is, but no official patch or exploit code is publicly available. This vulnerability is particularly relevant for websites relying on Relevanssi for search functionality, as query logs may contain sensitive or personally identifiable information. Attackers exploiting this flaw can harvest search logs remotely without authentication, increasing the risk of data leakage. The lack of known exploits reduces immediate risk, but the exposure of query logs can facilitate further reconnaissance or targeted attacks.

Potential Impact

The primary impact of CVE-2024-1380 is unauthorized disclosure of search query logs, which can contain sensitive or personally identifiable information depending on the website's content and user behavior. This confidentiality breach can lead to privacy violations, data leakage, and potential exposure of internal search patterns or business intelligence. While the vulnerability does not affect data integrity or system availability, the unauthorized access to logs can aid attackers in crafting more effective phishing, social engineering, or targeted attacks. Organizations relying heavily on Relevanssi for search may face reputational damage and compliance issues if sensitive data is exposed. The ease of exploitation (no authentication or user interaction required) increases the risk, especially for public-facing WordPress sites. However, the absence of known exploits in the wild and the medium CVSS score suggest a moderate immediate threat level. Nonetheless, the vulnerability should be addressed promptly to prevent potential data exposure and to maintain trust with users and stakeholders.

Mitigation Recommendations

1. Immediately verify if an updated version of the Relevanssi plugin is available that includes proper authorization checks and apply it as soon as possible. 2. If no official patch exists, implement temporary access controls at the web server or application firewall level to restrict access to the relevanssi_export_log_check() endpoint or related export functionality. 3. Review and limit user permissions within WordPress to minimize exposure of sensitive logs. 4. Monitor web server logs for unusual access patterns targeting the export log functionality. 5. Consider disabling or restricting the export log feature if it is not essential to your operations. 6. Conduct an audit of stored query logs to assess any sensitive data exposure and purge unnecessary logs. 7. Employ network-level protections such as IP whitelisting or VPN access for administrative functions related to Relevanssi. 8. Educate site administrators about the risks of unauthorized data export and encourage timely plugin updates. 9. Follow vendor communications closely for official patches or security advisories. 10. Implement a web application firewall (WAF) with custom rules to detect and block unauthorized attempts to access export functions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-02-08T20:32:05.188Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d2db7ef31ef0b56ea31

Added to database: 2/25/2026, 9:44:13 PM

Last enriched: 2/26/2026, 9:29:13 AM

Last updated: 2/26/2026, 9:35:53 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats