Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-10492 | The WP-GeSHi-Highlight — rock-solid syntax highlighting for 259 languages WordPress plugin through 1.4.3 processes user-supplied input as a regular expression via the wp_geshi_filter_replace_code() function, which could lead to Regular Expression Denial of Service (ReDoS) issue |
Thu, 15 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jgehrcke
Jgehrcke wp-geshi-highlight |
|
| Weaknesses | CWE-1333 | |
| CPEs | cpe:2.3:a:jgehrcke:wp-geshi-highlight:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Jgehrcke
Jgehrcke wp-geshi-highlight |
Thu, 10 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 10 Apr 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WP-GeSHi-Highlight — rock-solid syntax highlighting for 259 languages WordPress plugin through 1.4.3 processes user-supplied input as a regular expression via the wp_geshi_filter_replace_code() function, which could lead to Regular Expression Denial of Service (ReDoS) issue | |
| Title | WP-GeSHi-Highlight <= 1.4.3 - Author+ ReDoS | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-08-27T12:00:18.812Z
Reserved: 2025-02-20T18:39:38.739Z
Link: CVE-2024-13896
Updated: 2025-04-10T13:56:03.088Z
Status : Analyzed
Published: 2025-04-10T07:15:41.197
Modified: 2025-05-15T20:55:38.643
Link: CVE-2024-13896
No data.
OpenCVE Enrichment
No data.
EUVD