WordPress Plugin Vulnerable to IP Address Spoofing
CVE-2022-4529

5.3MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
5 September 2024

Summary

The Security Antivirus Firewall plugin for WordPress, specifically in versions up to and including 2.3.5, is susceptible to IP Address Spoofing. This vulnerability arises from inadequate restrictions applied to the source of IP Address information used for logging requests and enforcing login restrictions. An attacker could exploit this weakness by supplying a manipulated X-Forwarded-For header, allowing them to log in with a bypassed IP address, possibly overriding existing access controls and gaining unauthorized access to the system.

Affected Version(s)

Security, Antivirus, Firewall – S.A.F * <= 2.3.5

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Mohammadreza Rashidi
.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.