The FluentAuth WordPress plugin before 1.0.2 prioritizes getting a visitor's IP address from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass the IP-based blocks set by the plugin.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/62e3babc-00c6-4a35-972f-8f03ba70ba32 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/62e3babc-00c6-4a35-972f-8f03ba70ba32 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/62e3babc-00c6-4a35-972f-8f03ba70ba32 - Exploit, Third Party Advisory | |
Summary |
|
Information
Published : 2023-01-23 15:15
Updated : 2024-11-21 07:35
NVD link : CVE-2022-4746
Mitre link : CVE-2022-4746
CVE.ORG link : CVE-2022-4746
JSON object : View
Products Affected
wpmanageninja
- fluentauth
CWE
CWE-290
Authentication Bypass by Spoofing