CVE-2023-2897
09.06.2023, 07:15
The Brizy Page Builder plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.4.18. This is due to an implicit trust of user-supplied IP addresses in an 'X-Forwarded-For' HTTP header for the purpose of validating allowed IP addresses against a Maintenance Mode whitelist. Supplying a whitelisted IP address within the 'X-Forwarded-For' header allows maintenance mode to be bypassed and may result in the disclosure of potentially sensitive information or allow access to restricted functionality.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| brizy | brizy | 𝑥 ≤ 2.4.18 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-348 - Use of Less Trusted SourceThe software has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.
- CWE-345 - Insufficient Verification of Data AuthenticityThe software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
References