The WP-EMail WordPress plugin before 2.69.0 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based anti-spamming restrictions.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/a5940d0b-6b88-4418-87e2-02c0897bc2f1 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/a5940d0b-6b88-4418-87e2-02c0897bc2f1 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/a5940d0b-6b88-4418-87e2-02c0897bc2f1 - Exploit, Third Party Advisory |
28 Jun 2022, 21:24
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://wpscan.com/vulnerability/a5940d0b-6b88-4418-87e2-02c0897bc2f1 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 7.5 |
CPE | cpe:2.3:a:wp-email_project:wp-email:*:*:*:*:*:wordpress:*:* |
20 Jun 2022, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-20 11:15
Updated : 2024-11-21 06:41
NVD link : CVE-2022-1614
Mitre link : CVE-2022-1614
CVE.ORG link : CVE-2022-1614
JSON object : View
Products Affected
wp-email_project
- wp-email
CWE
CWE-639
Authorization Bypass Through User-Controlled Key