S4E

CVE-2021-4374 Scanner

CVE-2021-4374 Scanner - Unauthenticated Admin Account Creation vulnerability in WordPress Automatic Plugin

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

20 days 21 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

The WordPress Automatic Plugin is widely used by administrators and website managers to automate the publishing of content on WordPress platforms. This plugin is a favorite for users who want to easily pull content from various feeds and platforms, thereby enhancing the task of content curation. Developed by ValvePress, it is implemented across numerous WordPress sites given its capability to schedule posts and handle large volumes of content automation with minimal manual effort. Its popularity highlights the importance of ensured security, as such plugins have administrative access to a website's backend. Integrating seamlessly into WordPress, this plugin caters to users who require efficient content updates but need to be cautious of potential security threats. Notably, even websites with inactive plugins may still be vulnerable, accentuating the necessity for frequent security checks and updates.

The vulnerability identified in the WordPress Automatic Plugin involves unauthorized changes to WordPress options. Specifically, this vulnerability allows unauthenticated users to change arbitrary WordPress settings. Through a flawed script, attackers could utilize the `update_option()` function on POST parameters without needing authentication, leading to critical changes or disruptions. This flaw could result in unauthorized users gaining admin access or modifying site configuration, thereby posing a severe threat to site integrity and operation. Even disabled plugin instances remain susceptible, due to the standalone nature of the vulnerable script residing within plugin files. Administrators must prioritize patching this vulnerability given its potential impacts on site control and security.

This vulnerability particularly affects the `process_form.php` script within the WordPress Automatic Plugin. By leveraging this script, attackers can execute changes through the application's `update_option()` mechanism devoid of typical verification checks. As a critical flaw, it does not consider authentication or user permission, meaning attackers can input modifications directly, manipulating various WordPress configuration settings. The exploitation of this vulnerability occurs via POST requests sent to the vulnerable endpoint; administrators must thus secure access to this endpoint and ensure proper validation procedures are adhered to, preventing unsanctioned alterations.

If exploited, this vulnerability could allow attackers to gain extensive control over a WordPress site by becoming admin users without authentic credentials. Affected sites could face unauthorized changes to integral settings which could compromise the site's security posture. Furthermore, owing to misconfiguration risks, attackers might enact problematic changes leading to operational disruptions or defacement. Given the critical nature of the access provided, this vulnerability profoundly threatens the confidentiality, integrity, and availability of website data and operation, requiring immediate mitigation actions.

REFERENCES

Get started to protecting your digital assets