CVE-2024-35538

Typecho v1.3.0 was discovered to contain a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses by specifying an arbitrary IP as value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.
References
Link Resource
https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/ Exploit Third Party Advisory Release Notes
https://typecho.org Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:typecho:typecho:1.3.0:-:*:*:*:*:*:*

History

28 Apr 2025, 14:00

Type Values Removed Values Added
CPE cpe:2.3:a:typecho:typecho:1.3.0:-:*:*:*:*:*:*
References () https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/ - () https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/ - Exploit, Third Party Advisory, Release Notes
References () https://typecho.org - () https://typecho.org - Product
First Time Typecho typecho
Typecho

20 Aug 2024, 14:35

Type Values Removed Values Added
Summary
  • (es) Se descubrió que Typecho v1.3.0 contiene una vulnerabilidad de suplantación de IP del cliente, que permite a los atacantes falsificar sus direcciones IP especificando una IP arbitraria como valor de los encabezados X-Forwarded-For o Client-Ip mientras realizan solicitudes HTTP.
CWE CWE-290
CWE-444
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

19 Aug 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-19 21:15

Updated : 2025-04-28 14:00


NVD link : CVE-2024-35538

Mitre link : CVE-2024-35538

CVE.ORG link : CVE-2024-35538


JSON object : View

Products Affected

typecho

  • typecho
CWE
CWE-290

Authentication Bypass by Spoofing

CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')