Pie Register Plugin 未授权管理员会话劫持漏洞
漏洞信息
漏洞名称: Pie Register Plugin 未授权管理员会话劫持漏洞
漏洞编号:
- CVE: CVE-2025-34077
漏洞类型: 权限绕过
漏洞等级: 高危
漏洞描述: Pie Register是WordPress平台上一款流行的用户注册插件,广泛用于网站的用户管理和注册流程中。该插件在版本3.7.1.4及之前存在一个严重的权限绕过漏洞,允许攻击者未经授权即可劫持管理员会话。漏洞的技术根源在于插件对登录端点的POST请求处理不当,未能正确验证会话令牌或实施有效的访问控制措施。攻击者可以通过发送特制的POST请求到目标站点的登录端点,利用漏洞提取有效的Set-Cookie值,从而获得管理员级别的访问权限。这一漏洞的影响极为严重,因为攻击者无需任何认证即可利用,且可以远程执行攻击,导致网站被完全控制、数据泄露或其他恶意操作。由于Pie Register插件的广泛使用,该漏洞对大量WordPress网站构成了实际威胁。
产品厂商: WordPress
产品名称: Pie Register Plugin
影响版本: version <= 3.7.1.4
来源: https://github.com/0xgh057r3c0n/CVE-2025-34077
类型: CVE-2025:github search
仓库文件
- .gitignore
- CVE-2025-34077.py
- CVE-2025-34077.yaml
- LICENSE
- README.md
- poc-success.png
来源概述
CVE-2025-34077
Unauthenticated Admin Session Hijack - Pie Register Plugin (≤ 3.7.1.4)
📌 Description
This exploit targets a vulnerability in the Pie Register WordPress plugin (versions ≤ 3.7.1.4), allowing unauthenticated session hijacking of admin accounts.
🛡️ This tool is for authorized testing and research only. Do not use it on systems you do not own or have explicit permission to test.
🧪 Proof of Concept
🚀 Usage
1 | |
✅ Features
- Sends crafted POST payload to target site
- Extracts valid
Set-Cookievalues from unauthenticated response - Confirms exploit success with cookie details
- Works with tools like Burp Suite or browser dev tools
🧠 Technical Details
- Vulnerability Type: Auth Bypass / Session Hijack
- Plugin: Pie Register for WordPress
- Affected Versions: ≤ 3.7.1.4
- Vector: Crafted POST request to login endpoint
- Impact: Attacker gains administrator-level access via hijacked cookies
⚠️ Disclaimer
This script is provided for:
- Educational purposes
- Authorized penetration testing
- Security research
You are fully responsible for any misuse. Unauthorized use of this tool may violate laws.
👤 Author
- Handle: 0xgh057r3c0n
- GitHub: github.com/0xgh057r3c0n/CVE-2025-34077
📄 License
This project is licensed under the MIT License.