Authentication vulnerability in Limit Login Attempts Reloaded 2.17.3

The limit-login-attempts-reloaded plugin before version 2.17.4 for WordPress had a security issue that allowed someone to bypass the rate limits that are set up to protect against brute force attacks. This was possible because the plugin was configured to accept any kind of header as the source IP address

Detected in:

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.