3 results (0.002 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The Web Application Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1.2. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in. • https://plugins.trac.wordpress.org/changeset/3055548/web-application-firewall/trunk/helper/utility.php https://www.wordfence.com/threat-intel/vulnerabilities/id/0e99531c-8742-4f91-8525-65bb3cb06644?source=cve • CWE-348: Use of Less Trusted Source •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

The Malware Scanner plugin and the Web Application Firewall plugin for WordPress (both by MiniOrange) are vulnerable to privilege escalation due to a missing capability check on the mo_wpns_init() function in all versions up to, and including, 4.7.2 (for Malware Scanner) and 2.1.1 (for Web Application Firewall). This makes it possible for unauthenticated attackers to escalate their privileges to that of an administrator. El complemento Malware Scanner plugin and the Web Application Firewall para WordPress (ambos de MiniOrange) son vulnerables a la escalada de privilegios debido a una falta de verificación de capacidad en la función mo_wpns_init() en todas las versiones hasta la 4.7.2 incluida (para Malware Scanner). ) y 2.1.1 (para firewall de aplicaciones web). Esto hace posible que los atacantes no autenticados escale sus privilegios a los de administrador. • https://plugins.trac.wordpress.org/browser/miniorange-malware-protection/tags/4.7.2/handler/login.php#L89 https://wordpress.org/plugins/miniorange-malware-protection https://www.wordfence.com/threat-intel/vulnerabilities/id/6347f588-a3fd-4909-ad57-9d78787b5728?source=cve • CWE-304: Missing Critical Step in Authentication •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The Page Restriction WordPress (WP) – Protect WP Pages/Post plugin for WordPress is vulnerable to information disclosure in all versions up to, and including, 1.3.4. This is due to the plugin not properly restricting access to pages via the REST API when a page has been made private. This makes it possible for unauthenticated attackers to view protected pages. The vendor has decided that they will not implement REST API protection on posts and pages and the restrictions will only apply to the front-end of the site. The vendors solution was to add notices throughout the dashboard and recommends installing the WordPress REST API Authentication plugin for REST API coverage. • https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034414%40page-and-post-restriction&new=3034414%40page-and-post-restriction&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e33a5c-df7c-4ef5-a59c-1c31abcda6d1?source=cve • CWE-693: Protection Mechanism Failure •