Activity Log Plugin on WordPress HTTP Header X-Forwarded-For neutralization for logs

A vulnerability has been found in Activity Log Plugin on WordPress and classified as critical. This vulnerability affects unknown code of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to improper output neutralization for logs. Using CWE to declare the problem leads to CWE-117. The weakness was presented 11/11/2022. The advisory is shared for download at drive.google.com. This vulnerability was named CVE-2022-3941. The attack can be initiated remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The current price for an exploit might be approx. USD $0-$5k at the moment. It is declared as proof-of-concept. It is possible to download the exploit at drive.google.com. As 0-day the estimated underground price was around $0-$5k. A possible mitigation has been published even before and not after the disclosure of the vulnerability.

Field11/11/2022 08:1112/17/2022 08:2312/17/2022 08:27
nameActivity Log PluginActivity Log PluginActivity Log Plugin
platformWordPressWordPressWordPress
componentHTTP Header HandlerHTTP Header HandlerHTTP Header Handler
argumentX-Forwarded-ForX-Forwarded-ForX-Forwarded-For
cwe117 (neutralization for logs)117 (neutralization for logs)117 (neutralization for logs)
risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
urlhttps://drive.google.com/file/d/1YNOLomPC95rRvtk0topUhStVIa7Y8lcq/viewhttps://drive.google.com/file/d/1YNOLomPC95rRvtk0topUhStVIa7Y8lcq/viewhttps://drive.google.com/file/d/1YNOLomPC95rRvtk0topUhStVIa7Y8lcq/view
availability111
publicity111
urlhttps://drive.google.com/file/d/1x-pgK3_-uS7NWfkEt_tk4Wc9FhXk-pYX/viewhttps://drive.google.com/file/d/1x-pgK3_-uS7NWfkEt_tk4Wc9FhXk-pYX/viewhttps://drive.google.com/file/d/1x-pgK3_-uS7NWfkEt_tk4Wc9FhXk-pYX/view
cveCVE-2022-3941CVE-2022-3941CVE-2022-3941
responsibleVulDBVulDBVulDB
date1668121200 (11/11/2022)1668121200 (11/11/2022)1668121200 (11/11/2022)
typeWordPress PluginWordPress PluginWordPress Plugin
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciNNN
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_rlNDNDND
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore5.05.05.0
cvss2_vuldb_tempscore4.34.34.3
cvss3_vuldb_basescore5.35.35.3
cvss3_vuldb_tempscore4.84.84.8
cvss3_meta_basescore5.35.35.3
cvss3_meta_tempscore4.84.85.0
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1668121200 (11/11/2022)1668121200 (11/11/2022)
cve_nvd_summaryA vulnerability has been found in Activity Log Plugin and classified as critical. This vulnerability affects unknown code of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to improper output neutralization for logs. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213448.A vulnerability has been found in Activity Log Plugin and classified as critical. This vulnerability affects unknown code of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to improper output neutralization for logs. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213448.
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cve_cnaVulDB
cvss3_cna_basescore5.3

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!