This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Critical Broken Access Control in WordPress Automatic Plugin. π₯ **Consequences**: Attackers can modify critical WordPress options or create admin accounts without login.β¦
π‘οΈ **Root Cause**: **CWE-862** (Missing Authorization). The `process_form.php` script uses `update_option()` on all POST parameters without verifying user capabilities or authentication.β¦
π¦ **Affected**: **WordPress Automatic Plugin** by ValvePress. π **Versions**: **3.53.2 and below**. β οΈ Note: Vulnerability persists even if the plugin is **deactivated** because it is a standalone script.
Q4What can hackers do? (Privileges/Data)
π **Privileges**: Full Admin Control. π **Data**: Arbitrary option modification. π **Actions**: Create new administrator accounts, change critical site settings.β¦
π **Threshold**: **LOW**. π **Auth**: **Unauthenticated**. π **Network**: Remote (AV:N). π±οΈ **UI**: None required. π Easy to exploit via direct POST requests to the vulnerable endpoint.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp**: **YES**. π **PoC**: Available via Nuclei templates (`nuclei-templates`). π§ͺ **Testing**: Docker-based testing packages exist on GitHub. π **Wild Exploitation**: High risk due to simplicity.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for `/wp-content/plugins/wordpress-automatic/.../process_form.php`. π οΈ **Tools**: Use **Nuclei** with CVE-2021-4374 template.β¦
π‘οΈ **Fix**: **YES**. Official patch released. π₯ **Action**: Update WordPress Automatic Plugin to version **> 3.53.2**. β Verify vendor (ValvePress) updates. π Restart services after update.
Q9What if no patch? (Workaround)
π§ **Workaround**: If patching is delayed, **deactivate** the plugin? β οΈ **WARNING**: Data says it remains vulnerable even if deactivated! π« **Mitigation**: Block access to `process_form.php` via WAF or `.htaccess`.β¦