The Relevanssi – A Better Search plugin for WordPress is vulnerable to CSV Injection in all versions up to, and including, 4.22.1. This makes it possible for unauthenticated attackers to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Jan 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Relevanssi
Relevanssi relevanssi |
|
Weaknesses | CWE-1236 | |
CPEs | cpe:2.3:a:relevanssi:relevanssi:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Relevanssi
Relevanssi relevanssi |

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T20:05:08.380Z
Reserved: 2024-04-02T17:24:01.006Z
Link: CVE-2024-3214

Updated: 2024-08-01T20:05:08.380Z

Status : Analyzed
Published: 2024-04-09T19:15:40.377
Modified: 2025-01-28T21:03:01.313
Link: CVE-2024-3214

No data.