The Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the antihacker_add_whitelist() function in all versions up to, and including, 4.51. This makes it possible for unauthenticated attackers to add their IP Address to the whitelist circumventing protection
History

Fri, 10 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
First Time appeared Sminozzi
Sminozzi disable Json Api Login Lockdown Xml Rpc Pingback Stop User Enumeration Anit Hacker Scan
CPEs cpe:2.3:a:sminozzi:disable_json_api_login_lockdown_xml_rpc_pingback_stop_user_enumeration_anit_hacker_scan:*:*:*:*:*:*:*:*
Vendors & Products Sminozzi
Sminozzi disable Json Api Login Lockdown Xml Rpc Pingback Stop User Enumeration Anit Hacker Scan
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Title Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan <= 4.51 - Missing Authorization to Unauthenticated IP Address Whitelist

Tue, 11 Feb 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Billminozzi
Billminozzi anti Hacker
Weaknesses CWE-862
CPEs cpe:2.3:a:billminozzi:anti_hacker:*:*:*:*:*:wordpress:*:*
Vendors & Products Billminozzi
Billminozzi anti Hacker

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:47:39.380Z

Reserved: 2024-02-23T18:51:36.723Z

Link: CVE-2024-1860

cve-icon Vulnrichment

Updated: 2024-08-01T18:56:22.305Z

cve-icon NVD

Status : Modified

Published: 2024-02-28T10:15:09.320

Modified: 2026-04-08T18:20:52.607

Link: CVE-2024-1860

cve-icon Redhat

No data.