First published: Mon Apr 04 2022(Updated: )
The Blackhole for Bad Bots WordPress plugin before 3.3.2 uses headers such as CF-CONNECTING-IP, CLIENT-IP etc to determine the IP address of requests hitting the blackhole URL, which allows them to be spoofed. This could result in blocking arbitrary IP addresses, such as legitimate/good search engine crawlers / bots. This could also be abused by competitors to cause damage related to visibility in search engines, can be used to bypass arbitrary blocks caused by this plugin, block any visitor or even the administrator and even more.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Plugin-planet Blackhole For Bad Bots | <3.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-1165.
CVE-2022-1165 has a severity of 9.1 (critical).
The affected software version is Plugin-planet Blackhole For Bad Bots before version 3.3.2.
The vulnerability in Plugin-planet Blackhole For Bad Bots allows IP address spoofing by using headers such as CF-CONNECTING-IP and CLIENT-IP to determine the IP address of requests hitting the blackhole URL.
The potential impact of this vulnerability is the blocking of arbitrary IP addresses, including legitimate/good search engines.