We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
The Limit Login Attempts Plus plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 1.1.0. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.
Reserved 2022-12-16 | Published 2024-09-19 | Updated 2024-09-19 | Assigner WordfenceCWE-348 Use of Less Trusted Source
2024-09-18: | Disclosed |
Mohammadreza Rashidi
www.wordfence.com/...-1c8a-4403-b33b-c119bd96ad9d?source=cve
plugins.trac.wordpress.org/...nk/core/LimitLoginAttempts.php
Support options