cve/2022/CVE-2022-1601.md

18 lines
798 B
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-1601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1601)
![](https://img.shields.io/static/v1?label=Product&message=User%20Access%20Manager&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.2.18%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brighgreen)
### Description
The User Access Manager WordPress plugin before 2.2.18 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible for attackers to access restricted content in certain situations.
### POC
#### Reference
- https://wpscan.com/vulnerability/f6d3408c-2ceb-4a89-822b-13f5272a5fce
#### Github
No PoCs found on GitHub currently.