WordPress Ultimate Member Privilege Escalation Vulnerability
漏洞信息
漏洞名称: WordPress Ultimate Member Privilege Escalation Vulnerability
漏洞编号:
- CVE: CVE-2023-3460
漏洞类型: 权限提升
漏洞等级: 严重
漏洞描述: WordPress Ultimate Member插件是一个流行的用户会员管理插件,广泛应用于WordPress网站中,用于管理用户注册、登录和个人资料等功能。该插件在版本2.6.6及之前存在一个严重的权限提升漏洞(CVE-2023-3460),允许未经认证的攻击者通过构造恶意的注册请求,将普通用户权限提升至管理员权限。这一漏洞的技术根源在于插件在处理用户注册请求时,未能正确验证和过滤用户提交的数据,特别是对wp_capabilities
参数的检查不足,导致攻击者可以绕过正常的权限控制机制,直接赋予自己管理员权限。这一漏洞的影响极为严重,攻击者无需任何认证即可利用此漏洞,完全控制受影响的WordPress网站,包括但不限于发布恶意内容、窃取敏感数据、甚至进一步攻击网站服务器。由于该漏洞的利用门槛低且影响范围广,所有使用Ultimate Member插件且版本低于2.6.7的WordPress网站都应立即升级到最新版本,以避免潜在的安全风险。
产品厂商: Ultimate Member
产品名称: WordPress Ultimate Member Plugin
影响版本: ≤ 2.6.6
来源: https://github.com/GURJOTEXPERT/CVE-2023-3460
类型: CVE-2023:github search
仓库文件
- CVE-2023-3460.py
- README.md
来源概述
🚨 CVE-2023-3460 - WordPress Ultimate Member Privilege Escalation Exploit
This is a proof-of-concept (PoC) exploit for CVE-2023-3460, a critical vulnerability in the WordPress plugin Ultimate Member. It allows unauthenticated users to escalate their privileges to Administrator by crafting a malicious registration request.
🔥 Impact: Full site compromise through unauthorized admin account creation.
📌 Vulnerability Details
- Plugin Affected: Ultimate Member
- Affected Versions: ≤ 2.6.6
- Fixed Version: 2.6.7
- Exploit Type: Privilege Escalation via Registration Abuse
- Authentication Required: ❌ No
- CVE: CVE-2023-3460
⚙️ Requirements
- Python 3
requests
library
Install requirements:
1 |
|
🧪 Exploit Usage
1 |
|
✅ Example:
1 |
|
📥 Exploit Script Features
- Fetches CSRF nonce (
_wpnonce
) from the register page - Bypasses form validation
- Injects
wp_capabilities
withadministrator
role - Creates a new admin user without authentication
🔐 Sample Exploit Payload
1 |
|
🛡️ Mitigation
- Update Ultimate Member plugin to v2.6.7 or above
- Disable open registration if not required
- Monitor user creation logs for suspicious activity
📚 References
⚠️ Disclaimer
This script is provided for educational and authorized testing purposes only. Unauthorized exploitation of systems is illegal and unethical. Use it only on systems you own or have permission to test.
👨💻 Author
- 💀 [GURJOT SINGH]
- 🔒 [Linkdin: https://in.linkedin.com/in/gurjot-singh-8198b3220]