WordPress WAF Vulnerable to IP Address Spoofing
CVE-2022-4539
5.3MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 31 August 2024
Summary
The Web Application Firewall plugin for WordPress is susceptible to IP Address Spoofing due to insufficient filtering of the IP Address information utilized for logging and enforcing login restrictions. Attackers can exploit this vulnerability by modifying the X-Forwarded-For header to present a falsified IP Address. This manipulation can allow attackers to bypass restrictions that are designed to prevent access from specific IP addresses or geographical locations, thus compromising the integrity of the access control measures implemented by the website.
Affected Version(s)
Web Application Firewall – website security * <= 2.1.2
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Mohammadreza Rashidi