CVE-2023-4631

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to spoof their IP address when using the DoLogin Security plugin for WordPress, potentially bypassing security measures that rely on IP address verification. It occurs because the plugin improperly trusts certain headers, which can be manipulated if the attacker has access to the network or can send requests through a proxy.

Technical Description

The DoLogin Security WordPress plugin before 3.7 uses headers such as the X-Forwarded-For to retrieve the IP address of the request, which could lead to IP spoofing.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References