4.3
CVE-2024-13118
- EPSS 0.04%
- Veröffentlicht 25.03.2025 06:00:12
- Zuletzt bearbeitet 06.05.2025 19:45:11
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
IP Based Login <= 2.4.0 - Cross-Site Request forgery to Log Deletion
The IP Based Login WordPress plugin before 2.4.1 does not have CSRF checks in some places, which could allow attackers to make logged in users delete all logs via a CSRF attack
Mögliche Gegenmaßnahme
IP Based Login: Update to version 2.4.1, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
IP Based Login
Version
*-2.4.0
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Brijeshk89 ≫ Ip Based Login SwPlatformwordpress Version < 2.4.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.132 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.