WordPress Pie Register Authentication Bypass Vulnerability
漏洞信息
漏洞名称: WordPress Pie Register Authentication Bypass Vulnerability
漏洞编号:
CVE: CVE-2025-34077
漏洞类型: 权限绕过
漏洞等级: 严重
漏洞描述: WordPress Pie Register插件是一个广泛使用的WordPress用户注册插件,用于增强WordPress网站的用户注册和管理功能。该插件通常部署在需要用户注册功能的网站上,如会员制网站、论坛等。由于其广泛的应用,该插件的安全性对许多网站至关重要。该插件在3.7.1.4及之前版本中存在一个认证绕过漏洞,允许未经认证的攻击者通过提交特制的POST请求到登录端点,绕过认证机制。攻击者可以通过设置social_site=true并操纵user_id_social_site参数,为任意用户ID(包括管理员)生成有效的WordPress会话cookie。一旦认证成功,攻击者可能利用插件上传功能安装包含任意PHP代码的恶意插件,从而导致在底层服务器上执行远程代码。这种漏洞的存在主要是因为插件在处理用户认证请求时未能正确验证用户输入,导致认证机制被绕过。此漏洞的利用可能导致网站被完全控制,数据泄露,甚至服务器被入侵,且攻击者无需任何认证即可利用此漏洞,极大地增加了安全风险。
info: name: WordPress Pie Register <=3.7.1.4- Authentication Bypass author: kylew1004 severity: critical description: | An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators.Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server. reference: - https://github.com/MrjHaxcore/CVE-2025-34077 - https://nvd.nist.gov/vuln/detail/CVE-2025-34077 - https://securityvulnerability.io/vulnerability/CVE-2025-34077 metadata: verified:true max-request:1 publicwww-query:"/wp-content/plugins/pie-register/" tags: cve,cve2025,wordpress,wp-plugin,pie-register,wp,auth-bypass