WordPress Cerber Security, Antispam & Malware Scan – Multiple Bypass Vulnerabilities
There are multiple bypass vulnerabilities in the WordPress Cerber Security, Antispam & Malware Scan plugin. These vulnerabilities include:1. Stop user enumeration bypass: It is possible to bypass user enumeration protection by using the Post method instead of Get.2. Protect admin scripts bypass: Admin scripts protection can be bypassed by adding one or more slashes to the URI.3. Protects wp-login.php, wp-signup.php and wp-register.php from attacks bypass: This protection can be bypassed by encoding any character in the URI.4. Hide login URL bypass: The login URL can be bypassed by encoding any character in the URI, which will cause Cerber to return the secret slug in the Location header field.5. Stop user enumeration via REST API bypass: User enumeration can be bypassed by inserting /index.php/ between the domain and the REST route.6. Disable REST API bypass: Same as above.