CVE-2022-2877
Summary
| CVE | CVE-2022-2877 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-09-16 09:15:00 UTC |
| Updated | 2022-09-20 13:25:00 UTC |
| Description | The Titan Anti-spam & Security WordPress plugin before 7.3.1 does not properly checks HTTP headers in order to validate the origin IP address, allowing threat actors to bypass it's block feature by spoofing the headers. |
Risk And Classification
Problem Types: CWE-639
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cm-wp | Titan Anti-spam Security | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Titan Anti-spam & Security < 7.3.1 - Protection Bypass due to IP Spoofing WordPress Security Vulnerability | MISC | wpscan.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Daniel Ruf
There are currently no legacy QID mappings associated with this CVE.