Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-2897
PUBLISHED
More InfoOfficial Page
Assigner-Wordfence
Assigner Org ID-b15e7b5b-3da4-40ae-a43c-f7aa60e62599
View Known Exploited Vulnerability (KEV) details
Published At-09 Jun, 2023 | 06:48
Updated At-20 Dec, 2024 | 23:33
Rejected At-
▼CVE Numbering Authority (CNA)

The Brizy Page Builder plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.4.18. This is due to an implicit trust of user-supplied IP addresses in an 'X-Forwarded-For' HTTP header for the purpose of validating allowed IP addresses against a Maintenance Mode whitelist. Supplying a whitelisted IP address within the 'X-Forwarded-For' header allows maintenance mode to be bypassed and may result in the disclosure of potentially sensitive information or allow access to restricted functionality.

Affected Products
Vendor
themefusecom
Product
Brizy – Page Builder
Default Status
unaffected
Versions
Affected
  • From * through 2.4.18 (semver)
Problem Types
TypeCWE IDDescription
N/AN/ACWE-348 Use of Less Trusted Source
Type: N/A
CWE ID: N/A
Description: CWE-348 Use of Less Trusted Source
Metrics
VersionBase scoreBase severityVector
3.13.7LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 3.7
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Alex Thomas
Timeline
EventDate
Discovered2023-05-18 00:00:00
Vendor Notified2023-05-25 00:00:00
Disclosed2023-05-31 00:00:00
Event: Discovered
Date: 2023-05-18 00:00:00
Event: Vendor Notified
Date: 2023-05-25 00:00:00
Event: Disclosed
Date: 2023-05-31 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.wordfence.com/threat-intel/vulnerabilities/id/ae342dd9-2f5f-4356-8fb4-9a3e5f4f8316?source=cve
N/A
https://plugins.trac.wordpress.org/changeset/2919443/brizy
N/A
Hyperlink: https://www.wordfence.com/threat-intel/vulnerabilities/id/ae342dd9-2f5f-4356-8fb4-9a3e5f4f8316?source=cve
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/changeset/2919443/brizy
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.wordfence.com/threat-intel/vulnerabilities/id/ae342dd9-2f5f-4356-8fb4-9a3e5f4f8316?source=cve
x_transferred
https://plugins.trac.wordpress.org/changeset/2919443/brizy
x_transferred
Hyperlink: https://www.wordfence.com/threat-intel/vulnerabilities/id/ae342dd9-2f5f-4356-8fb4-9a3e5f4f8316?source=cve
Resource:
x_transferred
Hyperlink: https://plugins.trac.wordpress.org/changeset/2919443/brizy
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found