First published: Tue Nov 15 2022(Updated: )
A vulnerability, which was classified as problematic, has been found in WBCE CMS. Affected by this issue is the function increase_attempts of the file wbce/framework/class.login.php of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to improper restriction of excessive authentication attempts. The attack may be launched remotely. The name of the patch is d394ba39a7bfeb31eda797b6195fd90ef74b2e75. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213716.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wbce Wbce Cms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4006 is a vulnerability found in WBCE CMS that allows for improper restriction of execution.
The severity of CVE-2022-4006 is high with a severity value of 7.5.
CVE-2022-4006 affects the function increase_attempts of the file wbce/framework/class.login.php in the Header Handler component of WBCE CMS.
To fix CVE-2022-4006 in WBCE CMS, update to the latest version and apply the available patches or fixes provided by the WBCE CMS developers.
You can find more information about CVE-2022-4006 on the following references: [Github Issue](https://github.com/WBCE/WBCE_CMS/issues/524), [Github Commit](https://github.com/wbce/wbce_cms/commit/d394ba39a7bfeb31eda797b6195fd90ef74b2e75), [VulDB](https://vuldb.com/?id.213716).