🔐 CVE Alert

CVE-2023-2897

LOW 3.7

Brizy Page Builder <= 2.4.18 - IP Address Spoofing to Protection Mechanism Bypass

CVSS Score
3.7
EPSS Score
0.0%
EPSS Percentile
0th

The Brizy Page Builder plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.4.18. This is due to an implicit trust of user-supplied IP addresses in an 'X-Forwarded-For' HTTP header for the purpose of validating allowed IP addresses against a Maintenance Mode whitelist. Supplying a whitelisted IP address within the 'X-Forwarded-For' header allows maintenance mode to be bypassed and may result in the disclosure of potentially sensitive information or allow access to restricted functionality.

CWE CWE-348
Vendor themefusecom
Product brizy – page builder
Published Jun 9, 2023
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for themefusecom brizy – page builder

Be the first to know when new low vulnerabilities affecting themefusecom brizy – page builder are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

themefusecom / Brizy – Page Builder
0 ≤ 2.4.18

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/ae342dd9-2f5f-4356-8fb4-9a3e5f4f8316?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/2919443/brizy

Credits

Alex Thomas