CVE-2022-1613

The Restricted Site Access WordPress plugin before 7.3.2 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations in certain situations.
References
Link Resource
https://wpscan.com/vulnerability/c03863ef-9ac9-402b-8f8d-9559c9988e2b Exploit Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:10up:restricted_site_access:*:*:*:*:*:wordpress:*:*

History

28 Sep 2022, 16:48

Type Values Removed Values Added
CPE cpe:2.3:a:10up:restricted_site_access:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References (MISC) https://wpscan.com/vulnerability/c03863ef-9ac9-402b-8f8d-9559c9988e2b - (MISC) https://wpscan.com/vulnerability/c03863ef-9ac9-402b-8f8d-9559c9988e2b - Exploit, Patch, Third Party Advisory
CWE CWE-639
First Time 10up
10up restricted Site Access

26 Sep 2022, 13:18

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-26 13:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-1613

Mitre link : CVE-2022-1613

CVE.ORG link : CVE-2022-1613


JSON object : View

Products Affected

10up

  • restricted_site_access
CWE
CWE-639

Authorization Bypass Through User-Controlled Key