Typecho v1.3.0 was discovered to contain a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses by specifying an arbitrary IP as value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.
References
| Link | Resource |
|---|---|
| https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/ | Exploit Third Party Advisory Release Notes |
| https://typecho.org | Product |
Configurations
History
28 Apr 2025, 14:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/ - Exploit, Third Party Advisory, Release Notes | |
| References | () https://typecho.org - Product | |
| CPE | cpe:2.3:a:typecho:typecho:1.3.0:-:*:*:*:*:*:* | |
| First Time |
Typecho typecho
Typecho |
20 Aug 2024, 14:35
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| CWE | CWE-444 CWE-290 |
19 Aug 2024, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-08-19 21:15
Updated : 2025-04-28 14:00
NVD link : CVE-2024-35538
Mitre link : CVE-2024-35538
CVE.ORG link : CVE-2024-35538
JSON object : View
Products Affected
typecho
- typecho
