Filtered by vendor Limit Login Attempts Project
Subscriptions
Filtered by product Limit Login Attempts
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2012-10001 | 1 Limit Login Attempts Project | 1 Limit Login Attempts | 2024-08-06 | 9.8 Critical |
The Limit Login Attempts plugin before 1.7.1 for WordPress does not clear auth cookies upon a lockout, which might make it easier for remote attackers to conduct brute-force authentication attempts. | ||||
CVE-2021-24657 | 1 Limit Login Attempts Project | 1 Limit Login Attempts | 2024-08-03 | 6.1 Medium |
The Limit Login Attempts WordPress plugin before 4.0.50 does not escape the IP addresses (which can be controlled by attacker via headers such as X-Forwarded-For) of attempted logins before outputting them in the reports table, leading to an Unauthenticated Stored Cross-Site Scripting issue. | ||||
CVE-2022-0787 | 1 Limit Login Attempts Project | 1 Limit Login Attempts | 2024-08-02 | 9.8 Critical |
The Limit Login Attempts (Spam Protection) WordPress plugin before 5.1 does not sanitise and escape some parameters before using them in SQL statements via AJAX actions (available to unauthenticated users), leading to SQL Injections | ||||
CVE-2023-1861 | 1 Limit Login Attempts Project | 1 Limit Login Attempts | 2024-08-02 | 5.4 Medium |
The Limit Login Attempts WordPress plugin through 1.7.2 does not sanitize and escape usernames when outputting them back in the logs dashboard, which could allow any authenticated users, such as subscriber to perform Stored Cross-Site Scripting attacks | ||||
CVE-2023-1912 | 1 Limit Login Attempts Project | 1 Limit Login Attempts | 2024-08-02 | 7.2 High |
The Limit Login Attempts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its lock logging feature in versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator accesses the plugin's settings page. This only works when the plugin prioritizes use of the X-FORWARDED-FOR header, which can be configured in its settings. |
Page 1 of 1.