First published: Sat Aug 31 2024(Updated: )
The Web Application Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1.2. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Miniorange Web Application Firewall for Wordpress | <2.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-4539 is classified as medium due to the potential for attackers to bypass security measures.
To fix CVE-2022-4539, update the Web Application Firewall plugin for WordPress to version 2.1.3 or later.
CVE-2022-4539 affects users of the Web Application Firewall plugin for WordPress versions up to 2.1.2.
CVE-2022-4539 is an IP Address Spoofing vulnerability due to insufficient restrictions on IP Address information.
Yes, CVE-2022-4539 can potentially allow an attacker to gain unauthorized access, leading to data breaches.