2 results (0.002 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The Web Application Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1.2. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in. • https://plugins.trac.wordpress.org/changeset/3055548/web-application-firewall/trunk/helper/utility.php https://www.wordfence.com/threat-intel/vulnerabilities/id/0e99531c-8742-4f91-8525-65bb3cb06644?source=cve • CWE-348: Use of Less Trusted Source •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

The Malware Scanner plugin and the Web Application Firewall plugin for WordPress (both by MiniOrange) are vulnerable to privilege escalation due to a missing capability check on the mo_wpns_init() function in all versions up to, and including, 4.7.2 (for Malware Scanner) and 2.1.1 (for Web Application Firewall). This makes it possible for unauthenticated attackers to escalate their privileges to that of an administrator. El complemento Malware Scanner plugin and the Web Application Firewall para WordPress (ambos de MiniOrange) son vulnerables a la escalada de privilegios debido a una falta de verificación de capacidad en la función mo_wpns_init() en todas las versiones hasta la 4.7.2 incluida (para Malware Scanner). ) y 2.1.1 (para firewall de aplicaciones web). Esto hace posible que los atacantes no autenticados escale sus privilegios a los de administrador. • https://plugins.trac.wordpress.org/browser/miniorange-malware-protection/tags/4.7.2/handler/login.php#L89 https://wordpress.org/plugins/miniorange-malware-protection https://www.wordfence.com/threat-intel/vulnerabilities/id/6347f588-a3fd-4909-ad57-9d78787b5728?source=cve • CWE-304: Missing Critical Step in Authentication •