WordPress Pie Register Authentication Bypass Vulnerability
漏洞信息
漏洞名称: WordPress Pie Register Authentication Bypass Vulnerability
漏洞编号:
CVE: CVE-2025-34077
漏洞类型: 权限绕过
漏洞等级: 严重
漏洞描述: WordPress Pie Register插件是一个用于WordPress的用户注册和管理插件,广泛应用于各种WordPress网站中,提供用户注册、登录、密码恢复等功能。该插件在版本3.7.1.4及之前存在一个认证绕过漏洞,允许未认证的攻击者通过提交特制的POST请求到登录端点,绕过认证机制,冒充任意用户,包括管理员。攻击者通过设置social_site=true并操纵user_id_social_site参数,可以为任何用户ID生成有效的WordPress会话cookie。一旦认证成功,攻击者可能利用插件上传功能安装包含任意PHP代码的恶意插件,导致在底层服务器上执行远程代码。此漏洞的根源在于插件未能正确验证用户提交的认证请求,使得攻击者能够绕过正常的认证流程。由于攻击者可以冒充管理员,此漏洞可能导致网站被完全控制,数据泄露,甚至服务器被入侵。攻击无需认证即可利用,且可以自动化执行,因此风险极高。
info: name: WordPress Pie Register <=3.7.1.4- Authentication Bypass author: kylew1004 severity: critical description: | An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators.Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server. reference: - https://github.com/MrjHaxcore/CVE-2025-34077 - https://nvd.nist.gov/vuln/detail/CVE-2025-34077 - https://securityvulnerability.io/vulnerability/CVE-2025-34077 metadata: verified:true max-request:1 publicwww-query:"/wp-content/plugins/pie-register/" tags: cve,cve2025,wordpress,wp-plugin,pie-register,wp,auth-bypass