
Cloud Vulnerability DB
A community-led vulnerabilities database
The Site Offline Or Coming Soon Or Maintenance Mode WordPress plugin (version < 1.5.3) contains a security vulnerability identified as CVE-2022-1580. The vulnerability was discovered by Daniel Ruf and was publicly disclosed on August 29, 2022. This security issue affects the plugin's main functionality of preventing user access to websites (WPScan).
The vulnerability exists in the plugin's access control mechanism. The plugin is designed to prevent users from accessing a website, but this protection can be bypassed by adding specific keywords to the URL's query string. A proof of concept demonstrates that adding '?admin' to the URL (e.g., https://example.com/?admin) would successfully bypass the plugin's protection mechanism (WPScan).
When exploited, this vulnerability allows unauthorized users to bypass the website's maintenance or offline mode, potentially accessing content that should be restricted. This effectively negates the primary purpose of the plugin, which is to limit website access during maintenance or development phases (WPScan).
The vulnerability has been fixed in version 1.5.3 of the Site Offline plugin. Website administrators are advised to update to this version or later to prevent unauthorized access to their websites (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."