Published on: Not Yet Published
Last Modified on: 01/23/2023 05:17:00 PM UTC
The FluentAuth WordPress plugin before 1.0.2 prioritizes getting a visitor's IP address from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass the IP-based blocks set by the plugin.
- CVE-2022-4746 has been assigned by [email protected] to track the vulnerability
- Affected Vendor/Software: Unknown - FluentAuth version = 0
|FluentAuth < 1.0.2 - Bypass blocks by IP Spoofing WordPress Security Vulnerability|| web.archive.org |
Inactive LinkNot Archived