CVSS 3.1 Score 7.1 of 10 (high)


Published Jun 20, 2024


CVE-2024-3597 is a vulnerability found in the Export WP Page to Static HTML/CSS plugin for WordPress. This vulnerability affects all versions up to and including 2.2.2 of the plugin. The issue arises from insufficient validation on the redirect URL provided via the rc_exported_zip_file parameter, which could allow unauthenticated attackers to redirect users to potentially malicious sites by tricking them into taking certain actions. The risk score for this vulnerability is 25, with a base severity of high and a base score of 7.1 according to the CVSS:3.1 scoring system. The exploitability score is 2.8, and it requires user interaction over a network attack vector. While the integrity and confidentiality impacts are low, the potential danger lies in the possibility of attackers redirecting users to malicious sites, posing a threat to organizations using this plugin.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.


Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-3597 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions