cve/2024/CVE-2024-13666.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-13666](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13666)
![](https://img.shields.io/static/v1?label=Product&message=Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brightgreen)
### Description
The Fluent Forms Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to IP Address Spoofing in all versions up to, and including, 5.2.12 due to insufficient IP address validation and use of user-supplied HTTP headers as a primary method for IP retrieval. This makes it possible for unauthenticated attackers spoof their IP address and submit forms that may have IP-based restrictions.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/fluentform/fluentform