cve/2023/CVE-2023-5133.md

18 lines
792 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-5133](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5133)
![](https://img.shields.io/static/v1?label=Product&message=user-activity-log-pro&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.3.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brighgreen)
### Description
This user-activity-log-pro WordPress plugin before 2.3.4 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic.
### POC
#### Reference
- https://wpscan.com/vulnerability/36c30e54-75e4-4df1-b01a-60c51c0e76a3
#### Github
No PoCs found on GitHub currently.