CVE-2025-11244 (CNNVD-202510-3378)
中文标题:
WordPress plugin Password Protected 授权问题漏洞
英文标题:
Password Protected <= 2.7.11 - Unauthenticated Authorization Bypass via IP Address Spoofing
漏洞描述
中文描述:
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin Password Protected 2.7.11及之前版本存在授权问题漏洞,该漏洞源于pp_get_ip_address函数信任客户端控制的HTTP标头,可能导致授权绕过。
英文描述:
The Password Protected plugin for WordPress is vulnerable to authorization bypass via IP address spoofing in all versions up to, and including, 2.7.11. This is due to the plugin trusting client-controlled HTTP headers (such as X-Forwarded-For, HTTP_CLIENT_IP, and similar headers) to determine user IP addresses in the `pp_get_ip_address()` function when the "Use transients" feature is enabled. This makes it possible for attackers to bypass authorization by spoofing these headers with the IP address of a legitimately authenticated user, granted the "Use transients" option is enabled (non-default configuration) and the site is not behind a CDN or reverse proxy that overwrites these headers.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| saadiqbal | Password Protected — Lock Entire Site, Pages, Posts, Categories, and Partial Content | - | ≤ 2.7.11 | - |
cpe:2.3:a:saadiqbal:password_protected_—_lock_entire_site,_pages,_posts,_categories,_and_partial_content:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
LOWCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-11244 |
2025-11-11 15:23:02 | 2025-11-11 07:40:05 |
| NVD | nvd_CVE-2025-11244 |
2025-11-11 15:01:07 | 2025-11-11 07:47:56 |
| CNNVD | cnnvd_CNNVD-202510-3378 |
2025-11-11 15:12:30 | 2025-11-11 08:00:19 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-202510-3378
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']