
Cloud Vulnerability DB
A community-led vulnerabilities database
The YOP Poll WordPress plugin versions before 6.4.3 contains a security vulnerability identified as CVE-2022-1600. The vulnerability was discovered by Daniel Ruf and was publicly disclosed on July 11, 2022. The issue affects the IP address validation mechanism in the plugin, which incorrectly prioritizes HTTP headers over PHP's REMOTE_ADDR for visitor IP detection (WPScan).
The vulnerability stems from the plugin's IP address validation implementation where it prioritizes certain HTTP headers over PHP's native REMOTE_ADDR variable for determining a visitor's IP address. This implementation flaw can be exploited by manipulating the X-Forwarded-For header to provide a different IP address than the legitimate one (WPScan).
The vulnerability allows attackers to bypass IP-based voting limitations in polls created using the YOP Poll plugin. By exploiting this vulnerability, malicious users can submit multiple votes by spoofing different IP addresses, potentially manipulating poll results (WPScan).
The vulnerability has been fixed in YOP Poll version 6.4.3. Website administrators using affected versions should upgrade to version 6.4.3 or later to protect against this vulnerability (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."