Authorization Bypass Vulnerability in Password Protected Plugin for WordPress
CVE-2025-11244

3.7LOW

What is CVE-2025-11244?

The Password Protected plugin for WordPress allows attackers to bypass authorization through IP address spoofing. This vulnerability impacts versions up to and including 2.7.11, utilizing a flaw in how the plugin evaluates client-controlled HTTP headers like X-Forwarded-For. When the 'Use transients' feature is enabled, attackers can exploit this weakness to impersonate authenticated users. This deliberate oversight requires that the site is not behind a CDN or reverse proxy that could alter these headers, enabling potential unauthorized access.

Affected Version(s)

Password Protected — Lock Entire Site, Pages, Posts, Categories, and Partial Content * <= 2.7.11

References

CVSS V3.1

Score:
3.7
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dmitrii Ignatyev
.