{"api_version":"1","generated_at":"2026-04-23T09:53:03+00:00","cve":"CVE-2023-5133","urls":{"html":"https://cve.report/CVE-2023-5133","api":"https://cve.report/api/cve/CVE-2023-5133.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-5133","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-5133"},"summary":{"title":"CVE-2023-5133","description":"This user-activity-log-pro WordPress plugin before 2.3.4 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2023-10-16 20:15:00","updated_at":"2023-11-07 04:23:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/36c30e54-75e4-4df1-b01a-60c51c0e76a3","name":"https://wpscan.com/vulnerability/36c30e54-75e4-4df1-b01a-60c51c0e76a3","refsource":"MISC","tags":[],"title":"User Activity Log Pro < 2.3.4 - IP Spoofing WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-5133","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5133","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"5133","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"solwininfotech","cpe5":"user_activity_log","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"pro","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-5133","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"This user-activity-log-pro WordPress plugin before 2.3.4 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-290 Authentication Bypass by Spoofing"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"user-activity-log-pro","version":{"version_data":[{"version_affected":"<","version_name":"0","version_value":"2.3.4"}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/36c30e54-75e4-4df1-b01a-60c51c0e76a3","refsource":"MISC","name":"https://wpscan.com/vulnerability/36c30e54-75e4-4df1-b01a-60c51c0e76a3"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Bartlomiej Marek and Tomasz Swiadek"},{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2023-10-16 20:15:00","lastModifiedDate":"2023-11-07 04:23:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:solwininfotech:user_activity_log:*:*:*:*:pro:wordpress:*:*","versionEndExcluding":"2.3.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}