Plugin Vulnerability Hub
Plugin 5 known issues Latest disclosed Jun 06, 2024

ElasticPress Vulnerabilities

Review known vulnerability records for the WordPress plugin ElasticPress (`elasticpress`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2024-35684, CVE-2022-25912 and CVE-2022-37601, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
5
High or Critical
2
Patch Coverage
100%
Last Updated
Jun 12, 2024
Priority CVE Quick Links

Fast paths into ElasticPress CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
4
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for ElasticPress so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
5 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
1 critical and 1 high severity finding.
Recent CVEs
CVE-2024-35684, CVE-2022-25912 and CVE-2022-37601
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for ElasticPress

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: Yes CVE-2024-35684
CVE-2024-35684: ElasticPress <= 5.1.0 - Cross-Site Request Forgery

The ElasticPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.1.0. This is due to missing or incorrect nonce validation on the do_sync function. This makes it possible for unauthenticated attackers to sync data via a for...

Published
Jun 06, 2024
Patched Release
5.1.1
Affected Versions
Versions up to 5.1.0
Next Step
Update to 5.1.1 or newer if supported.
Plugin Critical Patched: Yes CVE-2022-25912
CVE-2022-25912: simple-git < 3.15.0 - Remote Code Execution

The package simple-git is vulnerable to Remote Code Execution in versions before 3.15.0 when the ext transport protocol is enabled. This makes the vulnerability exploitable using the clone method. WordPress plugins and themes may be using this package, however, may not be vulnera...

Published
Dec 05, 2022
Patched Release
4.4.1
Affected Versions
Versions up to 4.4.0
Next Step
Update to 4.4.1 or newer if supported.
Plugin Medium Patched: Yes CVE-2022-37601
CVE-2022-37601: loader-utils (JS package) < 2.0.3 - Prototype Pollution

The package loader-utils before 1.4.1, from 2.0.0 and before 2.0.3 is vulnerable to prototype pollution via the function parseQuery which could make injecting malicious web scripts possible in some cases.

Published
Oct 12, 2022
Patched Release
4.4.0
Affected Versions
Versions up to 4.3.1
Next Step
Update to 4.4.0 or newer if supported.
Plugin High Patched: Yes
Moment.js <= 2.29.1 - Directory Traversal

The Javascript library moment.js is vulnerable to a path traversal vulnerability in versions up to, and including, 2.29.1. This makes it possible for attackers to read files outside of the accessed site's root directory leading to information disclosure.

Published
Apr 05, 2022
Patched Release
4.2.0
Affected Versions
Versions up to 4.1.0
Next Step
Update to 4.2.0 or newer if supported.
Plugin Medium Patched: Yes CVE-2021-4405
CVE-2021-4405: ElasticPress <= 3.5.3 - Cross-Site Request Forgery Bypass

The ElasticPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.5.3. This is due to missing or incorrect nonce validation on the epio_send_autosuggest_allowed() function. This makes it possible for unauthenticated attackers to...

Published
Mar 01, 2021
Patched Release
3.5.4
Affected Versions
Versions up to 3.5.3
Next Step
Update to 3.5.4 or newer if supported.