CVE-2020-35590
Vulnerability Scoring
Attack Complexity Details
- Attack Complexity: Low Impact
- Attack Vector: NETWORK
- Privileges Required: None
- Scope: UNCHANGED
- User Interaction: NONE
CIA Impact Definition
- Confidentiality: HIGH IMPACT
- Integrity: HIGH IMPACT
- Availability: HIGH IMPACT
CVE-2020-35590 Vulnerability Summary
LimitLoginAttempts.php in the limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows a bypass of (per IP address) rate limits because the X-Forwarded-For header can be forged. When the plugin is configured to accept an arbitrary header for the client source IP address, a malicious user is not limited to perform a brute force attack, because the client IP header accepts any arbitrary string. When randomizing the header input, the login count does not ever reach the maximum allowed retries.
Access Complexity Graph for CVE-2020-35590
Impact Analysis for CVE-2020-35590
CVE-2020-35590 Detailed Information and External References
Exploit Prediction Scoring System (EPSS)
The EPSS score estimates the probability that this vulnerability will be exploited in the near future.
0.00235
EPSS %
0.61743
References
- https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/
- https://wordpress.org/plugins/limit-login-attempts-reloaded/#developers
CWE
CWE-307CAPEC
- Dictionary-based Password Attack CAPEC-16 An attacker tries each of the words in a dictionary as passwords to gain access to the system via some user's account. If the password chosen by the user was a word within the dictionary, this attack will be successful (in the absence of other mitigations). This is a specific instance of the password brute forcing attack pattern. Dictionary Attacks differ from similar attacks such as Password Spraying (CAPEC-565) and Credential Stuffing (CAPEC-600), since they leverage unknown username/password combinations and don't care about inducing account lockouts.
- Password Brute Forcing CAPEC-49 An adversary tries every possible value for a password until they succeed. A brute force attack, if feasible computationally, will always be successful because it will essentially go through all possible passwords given the alphabet used (lower case letters, upper case letters, numbers, symbols, etc.) and the maximum length of the password.
- Use of Known Domain Credentials CAPEC-560 An adversary guesses or obtains (i.e. steals or purchases) legitimate credentials (e.g. userID/password) to achieve authentication and to perform authorized actions under the guise of an authenticated user or service.
- Password Spraying CAPEC-565 In a Password Spraying attack, an adversary tries a small list (e.g. 3-5) of common or expected passwords, often matching the target's complexity policy, against a known list of user accounts to gain valid credentials. The adversary tries a particular password for each user account, before moving onto the next password in the list. This approach assists the adversary in remaining undetected by avoiding rapid or frequent account lockouts. The adversary may then reattempt the process with additional passwords, once enough time has passed to prevent inducing a lockout.
- Credential Stuffing CAPEC-600 An adversary tries known username/password combinations against different systems, applications, or services to gain additional authenticated access. Credential Stuffing attacks rely upon the fact that many users leverage the same username/password combination for multiple systems, applications, and services.
- Use of Known Kerberos Credentials CAPEC-652 An adversary obtains (i.e. steals or purchases) legitimate Kerberos credentials (e.g. Kerberos service account userID/password or Kerberos Tickets) with the goal of achieving authenticated access to additional systems, applications, or services within the domain.
- Use of Known Operating System Credentials CAPEC-653 An adversary guesses or obtains (i.e. steals or purchases) legitimate operating system credentials (e.g. userID/password) to achieve authentication and to perform authorized actions on the system, under the guise of an authenticated user or service. This applies to any Operating System.
Vulnerable Configurations
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.7.4:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.7.4:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.8.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.8.0:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.8.1:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.8.1:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.9.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.9.0:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.10.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.10.0:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.10.1:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.10.1:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.11.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.11.0:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.12.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.12.0:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.12.1:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.12.1:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.12.2:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.12.2:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.12.3:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.12.3:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.13.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.13.0:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.14.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.14.0:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.15.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.15.0:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.15.1:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.15.1:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.15.2:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.15.2:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.17.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.17.0:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.17.1:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.17.1:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.17.2:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.17.2:*:*:*:*:wordpress:*:*
-
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.17.3:*:*:*:*:wordpress:*:*
cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:2.17.3:*:*:*:*:wordpress:*:*
CVSS3 Source
nvd@nist.gov
CVSS3 Type
Primary
CVSS3 Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Protect Your Infrastructure: Combat Critical CVE Threats
Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.
Recently Published CVEs
- CVE-2025-1381 – A vulnerability was found in code-projects Real Estate Property Management System 1.0. It has been classified as critical. This affects an unknown ...
- CVE-2025-1380 – A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of...
- CVE-2025-1379 – A vulnerability has been found in code-projects Real Estate Property Management System 1.0 and classified as critical. Affected by this vulnerabili...
- CVE-2025-1378 – A vulnerability, which was classified as problematic, was found in radare2 5.9.9 33286. Affected is an unknown function in the library /libr/main/r...
- CVE-2024-47935 – Improper Validation of Integrity Check Value vulnerability in TXOne Networks StellarProtect (Legacy Mode), StellarEnforce, and Safe Lock allows an ...
- CVE-2024-13726 – The Coder WordPress plugin through 1.3.4 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action ...
- CVE-2024-13627 – The OWL Carousel Slider WordPress plugin through 2.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a R...
- CVE-2024-13626 – The VR-Frases (collect & share quotes) WordPress plugin through 3.0.1 does not sanitise and escape a parameter before outputting it back in the pag...
- CVE-2024-13625 – The Tube Video Ads Lite WordPress plugin through 1.5.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a...
- CVE-2024-13608 – The Track Logins WordPress plugin through 1.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perfo...