vendor:
Limit Login Attempts Reloaded
by:
isdampe
8.1
CVSS
HIGH
Rate Limiter Bypass
770
CWE
Product Name: Limit Login Attempts Reloaded
Affected Version From: 2.7.2004
Affected Version To: 2.7.2004
Patch Exists: YES
Related CWE:
CPE: a:wpchef:limit_login_attempts_reloaded:2.7.4
Platforms Tested: WordPress 5.1.1
2019
Limit Login Attempts Reloaded by WPChef rate limiter bypass
The plugin's primary goal is to limit the rate at which an individual can attempt to authenticate with WordPress. Plugin has support for HTTP headers X_FORWARDED_FOR and X_SUCURI_CLIENTIP to allow rate limiting for users when web servers are behind a reverse proxy service. However, REMOTE_ADDR is not verified as a whitelisted proxy address, thus allowing an attacker to easily forge either the X_FORWARDED_FOR or X_SUCURI_CLIENTIP headers to completely bypass the rate limiting service.
Mitigation:
Update to the latest version of the plugin, as the vulnerability has been patched in version 2.7.5.