Products
Maintenance Redirect
- n/a
- 2.0.1
Source
audit@patchstack.com
Tags
CVE-2024-45453 details
Published : Sept. 23, 2024, 1:15 a.m.
Last Modified : Sept. 23, 2024, 1:15 a.m.
Last Modified : Sept. 23, 2024, 1:15 a.m.
Description
Authentication Bypass by Spoofing vulnerability in Peter Hardy-vanDoorn Maintenance Redirect allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Maintenance Redirect: from n/a through 2.0.1.
CVSS Score
1 | 2 | 3.7 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-290 | Authentication Bypass by Spoofing | This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
Base Score
3.7
Exploitability Score
2.2
Impact Score
1.4
Base Severity
LOW
Vector String : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
References
URL | Source |
---|---|
https://patchstack.com/database/vulnerability/jf3-maintenance-mode/wordpress-maintenance-redirect-plugin-2-0-1-ip-bypass-vulnerability?_s_id=cve | audit@patchstack.com |
This website uses the NVD API, but is not approved or certified by it.