The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate their value to bypass the login limit feature in the Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10.
History

Wed, 14 May 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Wpase
Wpase admin And Site Enhancements
Weaknesses CWE-290
CPEs cpe:2.3:a:wpase:admin_and_site_enhancements:*:*:*:*:free:wordpress:*:*
cpe:2.3:a:wpase:admin_and_site_enhancements:*:*:*:*:pro:wordpress:*:*
Vendors & Products Wpase
Wpase admin And Site Enhancements

Tue, 04 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Mar 2025 06:15:00 +0000

Type Values Removed Values Added
Description The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate their value to bypass the login limit feature in the Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10.
Title Admin and Site Enhancements (ASE) < 7.6.10 - Limit Login Attempt Bypass via IP Spoofing
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-03-04T06:00:04.054Z

Updated: 2025-03-04T14:32:08.168Z

Reserved: 2025-01-23T18:49:40.091Z

Link: CVE-2024-13685

cve-icon Vulnrichment

Updated: 2025-03-04T14:31:27.857Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-04T06:15:27.240

Modified: 2025-05-14T14:51:01.703

Link: CVE-2024-13685

cve-icon Redhat

No data.