Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-4374 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Critical Broken Access Control in WordPress Automatic Plugin. πŸ’₯ **Consequences**: Attackers can modify critical WordPress options or create admin accounts without login.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-862** (Missing Authorization). The `process_form.php` script uses `update_option()` on all POST parameters without verifying user capabilities or authentication.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **WordPress Automatic Plugin** by ValvePress. πŸ“‰ **Versions**: **3.53.2 and below**. ⚠️ Note: Vulnerability persists even if the plugin is **deactivated** because it is a standalone script.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Full Admin Control. πŸ“ **Data**: Arbitrary option modification. πŸ†” **Actions**: Create new administrator accounts, change critical site settings.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. πŸ”“ **Auth**: **Unauthenticated**. 🌐 **Network**: Remote (AV:N). πŸ–±οΈ **UI**: None required. πŸš€ Easy to exploit via direct POST requests to the vulnerable endpoint.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exp**: **YES**. πŸ“œ **PoC**: Available via Nuclei templates (`nuclei-templates`). πŸ§ͺ **Testing**: Docker-based testing packages exist on GitHub. 🌍 **Wild Exploitation**: High risk due to simplicity.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for `/wp-content/plugins/wordpress-automatic/.../process_form.php`. πŸ› οΈ **Tools**: Use **Nuclei** with CVE-2021-4374 template.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Fix**: **YES**. Official patch released. πŸ“₯ **Action**: Update WordPress Automatic Plugin to version **> 3.53.2**. βœ… Verify vendor (ValvePress) updates. πŸ”„ Restart services after update.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed, **deactivate** the plugin? ⚠️ **WARNING**: Data says it remains vulnerable even if deactivated! 🚫 **Mitigation**: Block access to `process_form.php` via WAF or `.htaccess`.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL** (CVSS 9.8). 🚨 **Priority**: **IMMEDIATE**. ⏱️ **Time**: Patch now. πŸ“‰ **Risk**: Unauthenticated remote code/config execution. πŸ†˜ Do not ignore; active exploitation tools exist.