Ivory Search – WordPress Search Plugin <= 5.5.6 - Information Exposure via AJAX Search Form
The Ivory Search – WordPress Search Plugin plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 5.5.6 via the ajax_load_posts function. This makes it possible for unauthenticated attackers to extract text data from password-protected posts using the boolean-based attack on the AJAX search form
CVE-2024-6835 is a medium severity with CVSS 5.3 Vulnerability issue affecting the Plugin Ivory Search – WordPress Search Plugin. It affects Versions up to 5.5.6 and is fixed in 5.5.7.
CVE-2024-6835 is tracked for the Plugin Ivory Search – WordPress Search Plugin as medium severity with CVSS 5.3. The affected range is Versions up to 5.5.6. Update Ivory Search – WordPress Search Plugin to 5.5.7 or newer where that version is compatible with the site.
| Software Type | Plugin |
|---|---|
| Software Slug |
add-search-to-menu
View on wordpress.org
|
| CVE | CVE-2024-6835 |
| Patched Versions |
5.5.7
|
| Affected Versions |
Versions up to 5.5.6
|
Related CVEs for Ivory Search – WordPress Search Plugin
These internal links group the same WordPress plugin by CVE, issue type, severity, and patch status so operators and search engines can connect the full vulnerability cluster.
Ivory Search <= 4.6.6 - Reflected Cross-Site Scripting
Ivory Search <= 4.6 - Reflected Cross Site Scripting
Ivory Search <= 5.5.12 - Missing Authorization
Ivory Search <= 5.4 - Multiple Admin+ Stored Cross-Site Scripting
Ivory Search <= 5.5.13 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'menu_gcse' and 'nothing_found_text' Parameters
Ivory Search – WordPress Search Plugin <= 5.5.9 - Authenticated (Admin+) Stored Cross-Site Scripting
Ivory Search – WordPress Search Plugin <= 5.5.5 - Missing Authorization to Authenticated (Subscriber+) Index Creation
Ivory Search <= 4.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
This record contains material that is subject to copyright
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more
License: CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for such purposes is authorized provided that you reproduce MITRE's copyright designation and this license in any such copy. Read more