CVE-2024-13896

The WP-GeSHi-Highlight — rock-solid syntax highlighting for 259 languages WordPress plugin through 1.4.3 processes user-supplied input as a regular expression via the wp_geshi_filter_replace_code() function, which could lead to Regular Expression Denial of Service (ReDoS) issue
Configurations

Configuration 1 (hide)

cpe:2.3:a:jgehrcke:wp-geshi-highlight:*:*:*:*:*:wordpress:*:*

History

15 May 2025, 20:55

Type Values Removed Values Added
CWE CWE-1333
First Time Jgehrcke
Jgehrcke wp-geshi-highlight
References () https://wpscan.com/vulnerability/b8b622ea-e090-45ad-8755-b050fc055231/ - () https://wpscan.com/vulnerability/b8b622ea-e090-45ad-8755-b050fc055231/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:jgehrcke:wp-geshi-highlight:*:*:*:*:*:wordpress:*:*

11 Apr 2025, 15:39

Type Values Removed Values Added
Summary
  • (es) El complemento WP-GeSHi-Highlight — rock-solid syntax highlighting for 259 languages de WordPress hasta la versión 1.4.3, procesa la entrada proporcionada por el usuario como una expresión regular a través de la función wp_geshi_filter_replace_code(), lo que podría provocar un problema de denegación de servicio de expresiones regulares (ReDoS).

10 Apr 2025, 14:15

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/b8b622ea-e090-45ad-8755-b050fc055231/ - () https://wpscan.com/vulnerability/b8b622ea-e090-45ad-8755-b050fc055231/ -
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

10 Apr 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-10 07:15

Updated : 2025-05-15 20:55


NVD link : CVE-2024-13896

Mitre link : CVE-2024-13896

CVE.ORG link : CVE-2024-13896


JSON object : View

Products Affected

jgehrcke

  • wp-geshi-highlight
CWE
CWE-1333

Inefficient Regular Expression Complexity