RSFirewall tries to identify the original IP address by looking at different HTTP headers. A bypass is possible due to the way it is implemented.
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352 | Exploit Third Party Advisory | 
| https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352 | Exploit Third Party Advisory | 
Configurations
                    History
                    27 May 2025, 21:06
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | NVD-CWE-noinfo | 
21 Apr 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-345 | 
21 Nov 2024, 06:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352 - Exploit, Third Party Advisory | 
07 Nov 2023, 03:40
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | 
Information
                Published : 2022-12-15 19:15
Updated : 2025-05-27 21:06
NVD link : CVE-2021-4226
Mitre link : CVE-2021-4226
CVE.ORG link : CVE-2021-4226
JSON object : View
Products Affected
                rsjoomla
- rsfirewall\!
CWE
                