The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate their value to bypass the login limit feature in the Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10.
Metrics
Affected Vendors & Products
References
History
Wed, 14 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wpase
Wpase admin And Site Enhancements |
|
Weaknesses | CWE-290 | |
CPEs | cpe:2.3:a:wpase:admin_and_site_enhancements:*:*:*:*:free:wordpress:*:* cpe:2.3:a:wpase:admin_and_site_enhancements:*:*:*:*:pro:wordpress:*:* |
|
Vendors & Products |
Wpase
Wpase admin And Site Enhancements |
Tue, 04 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 04 Mar 2025 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate their value to bypass the login limit feature in the Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10. | |
Title | Admin and Site Enhancements (ASE) < 7.6.10 - Limit Login Attempt Bypass via IP Spoofing | |
References |
|

Status: PUBLISHED
Assigner: WPScan
Published: 2025-03-04T06:00:04.054Z
Updated: 2025-03-04T14:32:08.168Z
Reserved: 2025-01-23T18:49:40.091Z
Link: CVE-2024-13685

Updated: 2025-03-04T14:31:27.857Z

Status : Analyzed
Published: 2025-03-04T06:15:27.240
Modified: 2025-05-14T14:51:01.703
Link: CVE-2024-13685

No data.