Input validation vulnerability in Web Application Firewall – website security 2.1.2

The security plugin used for WordPress websites, called Web Application Firewall, has a vulnerability that allows hackers to spoof their IP Address. This means they can fake their location and access certain parts of the website that may have been blocked. The plugin versions 2.1.2 and below are affected by this issue because they do not have enough safeguards in place to prevent this type of attack. Hackers can manipulate the X-Forwarded-For header to use a different IP Address, which will be recorded in the website’s logs and can be used to bypass any restrictions set by the website owner.

Detected in:

Web Application Firewall – website security fixed vulnerable versions: >= * <= 2.1.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.