CVE-2023-2897
⚪ Do wiadomości
Podatność w wtyczce Brizy Page Builder umożliwia obejście trybu konserwacji przez fałszowanie adresu IP.
CVSS
3.7
EPSS
0.1%
Exploit
none
Vendor
brizy
Opis źródłowy (NVD)
The Brizy Page Builder plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.4.18. This is due to an implicit trust of user-supplied IP addresses in an 'X-Forwarded-For' HTTP header for the purpose of validating allowed IP addresses against a Maintenance Mode whitelist. Supplying a whitelisted IP address within the 'X-Forwarded-For' header allows maintenance mode to be bypassed and may result in the disclosure of potentially sensitive information or allow access to restricted functionality.
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 3.7 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2023-06-09 07:15:10 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 19:18:20 UTC |
Referencje
- https://plugins.trac.wordpress.org/changeset/2919443/brizy (security@wordfence.com) [Patch]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ae342dd9-2f5f-4356-8fb4-9a3e5f4f8316?source=cve (security@wordfence.com) [Third Party Advisory]