CVE-2022-1165: WordPress plugin vulnerability

Published by CVE Tracker on

The Blackhole for Bad Bots WordPress plugin before 3.3.2 uses headers such as CF-CONNECTING-IP, CLIENT-IP etc to determine the IP address of requests hitting the blackhole URL, which allows them to be spoofed. This could result in blocking arbitrary IP addresses, such as legitimate/good search engine crawlers / bots. This could also be abused by competitors to cause damage related to visibility in search engines, can be used to bypass arbitrary blocks caused by this plugin, block any visitor or even the administrator and even more.

How to mitigate CVE-2022-1165

Time needed: 5 minutes.

Follow the instructions, as they will assist you in mitigating the WordPress vulnerability that been reported in CVE-2022-1165.

  1. Install the latest version of WordPress

    Navigate to the official WordPress website and download the latest version of WordPress. The latest version contains the CVE-2022-1165 fix.
    Update to the latest version

  2. Perform a vulnerability assessment

    Perform a scan on your WordPress environment(s), and check for vulnerabilities. Verify if CVE-2022-1165 has been mitigated.

  3. Utilize the references

    The CVE-2022-1165 references have been provided for a reason. Utilize these references and make sure that you are correctly informed.

References

  • plugins.trac.wordpress.org/changeset/2666486
  • wpscan.com/vulnerability/10d85913-ea8c-4c2e-a32e-fa61cf191710
  • Share this information