CVE-2022-1613
Restricted Site Access < 7.3.2 - Access Bypass via IP Spoofing
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Restricted Site Access WordPress plugin before 7.3.2 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations in certain situations.
El plugin Restricted Site Access de WordPress versiones anteriores a 7.3.2, prioriza la obtención de la IP de un visitante a partir de determinados encabezados HTTP sobre REMOTE_ADDR de PHP, lo que hace posible saltarse las limitaciones basadas en la IP en determinadas situaciones.
The Restricted Site Access plugin for WordPress is vulnerable to IP Spoofing in versions up to, and including, 7.3.1
due to prioritizing getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR. This makes it possible to bypass IP-based limitations in certain situations.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-05-06 CVE Reserved
- 2022-08-31 CVE Published
- 2024-04-18 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-639: Authorization Bypass Through User-Controlled Key
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://wpscan.com/vulnerability/c03863ef-9ac9-402b-8f8d-9559c9988e2b | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
10up Search vendor "10up" | Restricted Site Access Search vendor "10up" for product "Restricted Site Access" | < 7.3.2 Search vendor "10up" for product "Restricted Site Access" and version " < 7.3.2" | wordpress |
Affected
|