5.3
CVE-2023-0581
- EPSS 0.94%
- Veröffentlicht 30.01.2023 15:15:09
- Zuletzt bearbeitet 08.04.2026 19:18:01
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
PrivateContent <= 8.4.3 - Protection Mechanism Bypass
The PrivateContent plugin for WordPress is vulnerable to protection mechanism bypass due to the use of client side validation in versions up to, and including, 8.4.3. This is due to the plugin checking if an IP had been blocklist via client-side scripts rather than server-side. This makes it possible for unauthenticated attackers to bypass any login restrictions that may prevent a brute force attack.
Mögliche Gegenmaßnahme
PrivateContent: Update to version 8.4.4, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
PrivateContent
Version
*-8.4.3
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Lcweb ≫ Privatecontent SwPlatformwordpress Version < 8.4.4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.94% | 0.763 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
| security@wordfence.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-602 Client-Side Enforcement of Server-Side Security
The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.