The Brizy Page Builder plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.4.18. This is due to an implicit trust of user-supplied IP addresses in an 'X-Forwarded-For' HTTP header for the purpose of validating allowed IP addresses against a Maintenance Mode whitelist. Supplying a whitelisted IP address within the 'X-Forwarded-For' header allows maintenance mode to be bypassed and may result in the disclosure of potentially sensitive information or allow access to restricted functionality.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2919443/brizy | Patch |
https://www.wordfence.com/threat-intel/vulnerabilities/id/ae342dd9-2f5f-4356-8fb4-9a3e5f4f8316?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-06-09 07:15
Updated : 2023-11-07 04:13
NVD link : CVE-2023-2897
Mitre link : CVE-2023-2897
CVE.ORG link : CVE-2023-2897
JSON object : View
Products Affected
brizy
- brizy
CWE
CWE-345
Insufficient Verification of Data Authenticity