S4E Mobile Logo

CVE-2022-0188 Scanner

CVE-2022-0188 Scanner - Broken Access Control vulnerability in CMP WordPress

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

19 days 21 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

CMP WordPress is a widely used plugin for the WordPress CMS, allowing website administrators to manage coming soon and maintenance page layouts. The plugin is popular among WordPress site owners for its ease of use and flexibility in design customizations. It is primarily used by web developers and administrators who need to put their sites temporarily offline for maintenance. CMP WordPress is often deployed in various web environments, ranging from personal blogs to large corporate websites. It provides features such as subscriber management, access control, and customizable themes. The plugin is distributed via the WordPress plugin repository and is frequently updated for new features and security improvements.

The broken access control vulnerability, in this case, is due to the plugin's failure to enforce proper permissions on the coming soon page feature. This flaw allows unauthenticated users to change the page layout, which can lead to various issues such as website defacement. Broken access control vulnerabilities are a common security issue, whereby users gain permissions they shouldn't have, leading to potentially severe security breaches. They are typically caused by incorrect or missing access control checks in the application's code. This particular vulnerability can be exploited without authentication, making it a critical issue for websites using the affected versions of the CMP WordPress plugin. Ensuring that access controls are correctly configured and implemented is essential to protect web applications from such vulnerabilities.

The vulnerability is present in the CMP WordPress plugin version 4.0.19 and earlier, specifically within the coming soon page feature. The technical flaw lies in the insufficient checking of user privileges, allowing unauthenticated users to access and modify settings intended only for site administrators. Attackers can exploit this vulnerability via a POST request to the affected endpoint. By doing so, they can alter the design and content of the "Coming Soon" page, affecting how site visitors perceive the website. The manipulation of the layout does not require valid credentials, thus enabling any remote user to exploit the flaw with the correct request parameters.

If exploited, this vulnerability can lead to misleading or defacement of a website's upcoming "Coming Soon" page. Attackers could potentially mislead visitors or damage the credibility of a website. Besides aesthetic damage, there could be financial or reputational repercussions for website owners. In more severe cases, a manipulated page could be used for phishing attacks or to distribute malware. Therefore, timely remediation of this vulnerability is critical to maintaining the integrity and security of affected websites. Users might find themselves victims of scams or malicious software if they interact with a compromised page.

REFERENCES

Get started to protecting your digital assets