The LOGIN AND REGISTRATION ATTEMPTS LIMIT plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address from logging in.
Metrics
Affected Vendors & Products
References
History
Mon, 19 Aug 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 17 Aug 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The LOGIN AND REGISTRATION ATTEMPTS LIMIT plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address from logging in. | |
Title | LOGIN AND REGISTRATION ATTEMPTS LIMIT<= 2.1 - IP Address Spoofing to Protection Mechanism Bypass | |
Weaknesses | CWE-348 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-08-17T07:34:21.670Z
Updated: 2024-08-19T17:12:44.937Z
Reserved: 2022-12-15T23:09:13.198Z
Link: CVE-2022-4532
Vulnrichment
Updated: 2024-08-19T17:12:41.049Z
NVD
Status : Awaiting Analysis
Published: 2024-08-17T08:15:04.887
Modified: 2024-08-19T13:00:23.117
Link: CVE-2022-4532
Redhat
No data.