Description
The WP Maintenance plugin for WordPress is vulnerable to IP Address Spoofing in all versions up to, and including, 6.1.9.2 due to insufficient IP address validation and use of user-supplied HTTP headers as a primary method for IP retrieval. This makes it possible for unauthenticated attackers to bypass maintenance mode.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16577 | The WP Maintenance plugin for WordPress is vulnerable to IP Address Spoofing in all versions up to, and including, 6.1.9.2 due to insufficient IP address validation and use of user-supplied HTTP headers as a primary method for IP retrieval. This makes it possible for unauthenticated attackers to bypass maintenance mode. |
References
History
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-348 |
Thu, 26 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wp Maintenance Project
Wp Maintenance Project wp Maintenance |
|
| CPEs | cpe:2.3:a:wp_maintenance_project:wp_maintenance:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wp Maintenance Project
Wp Maintenance Project wp Maintenance |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:06:33.422Z
Reserved: 2024-01-22T17:44:50.585Z
Link: CVE-2024-0789
Updated: 2024-08-01T18:18:18.508Z
Status : Deferred
Published: 2024-06-19T08:15:48.873
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-0789
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:15:50Z
Weaknesses
EUVD