CVE-2023-4281
Activity Log < 2.8.8 - IP Spoofing
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
This Activity Log WordPress plugin before 2.8.8 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic.
Este complemento de WordPress de registro de actividad anterior a 2.8.8 recupera direcciones IP de clientes de encabezados potencialmente no confiables, lo que permite a un atacante manipular su valor. Esto puede usarse para ocultar la fuente del tráfico malicioso.
The Activity Log plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.8.7. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging. Unauthenticated attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged instead of the users true IP address.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-08-09 CVE Reserved
- 2023-09-01 CVE Published
- 2023-09-24 First Exploit
- 2024-08-02 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-348: Use of Less Trusted Source
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/b0marek/CVE-2023-4281 | 2023-09-24 | |
https://wpscan.com/vulnerability/f5ea6c8a-6b07-4263-a1be-dd033f078d49 | 2024-08-02 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Activity Log Project Search vendor "Activity Log Project" | Activity Log Search vendor "Activity Log Project" for product "Activity Log" | < 2.8.8 Search vendor "Activity Log Project" for product "Activity Log" and version " < 2.8.8" | wordpress |
Affected
|