Lucene search

K
cvelistPatchstackCVELIST:CVE-2024-45453
HistorySep 23, 2024 - 12:06 a.m.

CVE-2024-45453 WordPress Maintenance Redirect plugin <= 2.0.1 - IP Bypass vulnerability

2024-09-2300:06:00
CWE-290
Patchstack
www.cve.org
5
wordpress
maintenance redirect
ip bypass
authentication bypass
spoofing vulnerability
peter hardy-vandoorn

CVSS3

3.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0

Percentile

9.6%

Authentication Bypass by Spoofing vulnerability in Peter Hardy-vanDoorn Maintenance Redirect allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Maintenance Redirect: from n/a through 2.0.1.

CNA Affected

[
  {
    "collectionURL": "https://wordpress.org/plugins",
    "defaultStatus": "unaffected",
    "packageName": "jf3-maintenance-mode",
    "product": "Maintenance Redirect",
    "vendor": "Peter Hardy-vanDoorn",
    "versions": [
      {
        "changes": [
          {
            "at": "2.1.0",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "2.0.1",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

3.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0

Percentile

9.6%

Related for CVELIST:CVE-2024-45453