Description
The Limit Login Attempts WordPress plugin before 4.0.50 does not escape the IP addresses (which can be controlled by attacker via headers such as X-Forwarded-For) of attempted logins before outputting them in the reports table, leading to an Unauthenticated Stored Cross-Site Scripting issue.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-11569 | The Limit Login Attempts WordPress plugin before 4.0.50 does not escape the IP addresses (which can be controlled by attacker via headers such as X-Forwarded-For) of attempted logins before outputting them in the reports table, leading to an Unauthenticated Stored Cross-Site Scripting issue. |
References
History
Tue, 24 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Limit Login Attempts < 4.0.50 - Unauthenticated Stored Cross-Site Scripting | Limit Login Attempts < 4.0.50 - Unauthenticated Stored Cross-Site Scripting |
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:35:20.431Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-24657
No data.
Status : Modified
Published: 2021-09-20T10:15:09.683
Modified: 2024-11-21T05:53:30.347
Link: CVE-2021-24657
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD