WordPress Pie Register Admin Privilege Escalation Vulnerability

漏洞信息

漏洞名称: WordPress Pie Register Admin Privilege Escalation Vulnerability

漏洞编号:

  • CVE: CVE-2025-34077

漏洞类型: 权限提升

漏洞等级: 高危

漏洞描述: WordPress的Pie Register插件(版本≤3.7.1.4)存在一个未授权端点,攻击者可以通过发送特定的POST请求来劫持管理员会话。此漏洞允许攻击者无需任何登录凭证即可窃取用户ID为1(通常是管理员)的会话cookie。受影响的软件包括Pie Register插件,版本小于等于3.7.1.4。漏洞的技术根源在于插件暴露了一个未经验证的端点,该端点允许攻击者通过提交特定的参数(user_id_social_site=1)来获取管理员的有效会话cookie。这种漏洞的存在可能导致严重的安全风险,包括但不限于远程代码执行、数据泄露和服务中断。由于攻击者无需认证即可利用此漏洞,因此其危害性较高,且可以自动化利用。

产品厂商: WordPress

产品名称: Pie Register

影响版本: <= 3.7.1.4

来源: https://github.com/MrjHaxcore/CVE-2025-34077

类型: CVE-2025:github search

仓库文件

  • README.md
  • pie.py

来源概述

CVE-2025-34077 — WordPress Pie Register ≤ 3.7.1.4 - Admin Privilege Escalation (Unauthenticated)

Exploit Status
CVE Badge
Python

💀 Author

Mrj Haxcore

🧠 Vulnerability Summary

The Pie Register plugin for WordPress (version ≤ 3.7.1.4) exposes an unauthenticated endpoint that allows an attacker to hijack admin sessions simply by POSTing a specific payload.

Exploitation results in stealing the session cookies of user ID 1 (usually admin) without needing any login credentials.


📦 Affected Software


📬 Vulnerable Parameter:

user_id_social_site=1
When posted to the root URL (/), this parameter causes the plugin to authenticate the attacker as the user with ID 1 (typically the admin), and issue valid session cookies.


🔧 Requirements

  • Python 3.x
  • requests, beautifulsoup4 (optional, for cookie parsing)

▶️ Run the Exploit

python3 pie.py http://target.site

---
Output
[*] Sending payload to hijack admin session...

[+] Successfully hijacked cookies for user_id=1 (admin):
    wordpress_sec_xxxxxx = <cookie_value>
    wordpress_logged_in_xxxxxx = <cookie_value>

[!] Use these cookies in your browser or tools like curl or Burp to act as admin.


WordPress Pie Register Admin Privilege Escalation Vulnerability
http://example.com/2025/07/09/github_2181432971/
作者
lianccc
发布于
2025年7月9日
许可协议