CVE-2021-25042

Medium
|5.4
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to add any IP address to the exclusion list of the WP Visitor Statistics plugin, potentially blocking legitimate traffic. It requires the attacker to be an authenticated user or to trick a logged-in user into executing the action, and it could also lead to malicious scripts being run in the admin area due to poor input handling.

Technical Description

The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 5.5 does not have authorisation and CSRF checks in the updateIpAddress AJAX action, allowing any authenticated user to call it, or make a logged in user do it via a CSRF attack and add an arbitrary IP address to exclude. Furthermore, due to the lack of validation, sanitisation and escaping, users could set a malicious value and perform Cross-Site Scripting attacks against logged in admin

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$741($500-$1K)
Vendor Response
Grade FPatched in 1467 days

Quick Information

Published

Feb 28, 2022

about 4 years ago

Last Modified

Mar 6, 2026

about 1 month ago

Vendor

codepress

Product

visitor statistics

Related Vulnerabilities

CVE-2024-24867High

This vulnerability allows an attacker to access sensitive information from the WP Visitor Statistics plugin, potentially exposing user data and site activity. It affects versions up to 6.9.4, so sites using this plugin without updates are at risk.

CVE-2023-0600Critical

This vulnerability allows attackers to execute unauthorized SQL commands on the database of websites using the WP Visitor Statistics plugin, potentially exposing sensitive data. It can be exploited by anyone visiting the site, as no authentication is required to launch the attack.

CVE-2022-4656Medium

This vulnerability allows an attacker with a low-level user role, like a contributor, to inject malicious scripts into the website, potentially leading to unauthorized actions or data theft. It occurs because the plugin fails to properly check and clean up certain inputs, making it easier for attackers to exploit.

CVE-2022-33965Critical

This vulnerability allows an attacker to access and manipulate the database of a WordPress site using the Osamaesh WP Visitor Statistics plugin, potentially exposing sensitive information or altering data. It can be exploited without needing to log in, making it particularly dangerous for any site using this plugin version 5.7 or earlier.

CVE-2022-0410High

This vulnerability allows an attacker with an authenticated user account to manipulate the database by injecting malicious SQL code through a poorly handled parameter in the WP Visitor Statistics plugin. If exploited, this could lead to unauthorized access to sensitive data or even complete control over the database.