CVE-2020-13485: Knock Knock plugin IP Whitelist bypass via an X-Forwarded-For HTTP header
9.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.53403%
CWE
Published
5/24/2022
Updated
4/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| verbb/knock-knock | composer | < 1.2.8 | 1.2.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper IP comparison (CWE-697) where the plugin trusted the X-Forwarded-For header without validation(). The changelog for 1.2.8 explicitly mentions fixing IP fetching to prevent header spoofing, indicating the whitelist check previously relied on untrusted headers. The service class handling access control (KnockKnockService) would contain the IP validation logic, making checkWhitelist the most likely vulnerable function. The high confidence comes from the direct correlation between the vulnerability description, CWE type, and the patch's focus on IP source correction.