The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 5.5 does not have authorisation and CSRF checks in the updateIpAddress AJAX action, allowing any authenticated user to call it, or make a logged in user do it via a CSRF attack and add an arbitrary IP address to exclude. Furthermore, due to the lack of validation, sanitisation and escaping, users could set a malicious value and perform Cross-Site Scripting attacks against logged in admin
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-11954 | The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 5.5 does not have authorisation and CSRF checks in the updateIpAddress AJAX action, allowing any authenticated user to call it, or make a logged in user do it via a CSRF attack and add an arbitrary IP address to exclude. Furthermore, due to the lack of validation, sanitisation and escaping, users could set a malicious value and perform Cross-Site Scripting attacks against logged in admin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 06 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codepress
Codepress visitor Statistics |
|
| CPEs | cpe:2.3:a:codepress:visitor_statistics:*:*:*:*:-:wordpress:*:* | |
| Vendors & Products |
Plugins-market
Plugins-market wp Visitor Statistics \(real Time Traffic\) |
Codepress
Codepress visitor Statistics |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:49:14.590Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-25042
No data.
Status : Analyzed
Published: 2022-02-28T09:15:08.580
Modified: 2026-03-06T19:34:18.977
Link: CVE-2021-25042
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD