Goal Reached Thanks to every supporter โ€” we hit 100%!

Goal: 1000 CNY ยท Raised: 1000 CNY

100.0%

CVE-2022-1609 โ€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

๐Ÿšจ **Essence**: A critical **Code Injection** vulnerability in School Management Pro. It stems from a **hidden backdoor** in the REST API.โ€ฆ

Q2Root Cause? (CWE/Flaw)

๐Ÿ›ก๏ธ **Root Cause**: The flaw is a **vague backdoor** embedded within the **REST API** endpoint (`/wp-json/am-member/license`). It allows unauthenticated input to be executed as system commands.โ€ฆ

Q3Who is affected? (Versions/Components)

๐Ÿซ **Affected Product**: **School Management Pro** by Weblizar (WordPress Plugin). ๐Ÿ“… **Versions**: **6.0** up to **9.9.6**. ๐Ÿ‡ฎ๐Ÿ‡ณ **Vendor**: Weblizar (Indian company). If you use these versions, you are at risk!

Q4What can hackers do? (Privileges/Data)

๐Ÿ’ป **Attacker Capabilities**: Full **Remote Code Execution (RCE)**. ๐Ÿ“‚ **Privileges**: The PoC shows execution as `www-data` (web server user).โ€ฆ

Q5Is exploitation threshold high? (Auth/Config)

๐Ÿ”“ **Exploitation Threshold**: **LOW**. ๐Ÿšซ **No Auth Required**: The backdoor is accessible via the REST API without login.โ€ฆ

Q6Is there a public Exp? (PoC/Wild Exploitation)

๐Ÿ’ฃ **Public Exploits**: **YES**. Multiple PoCs are available on GitHub (e.g., `savior-only`, `0xSojalSec`, `WitchWatcher`). ๐Ÿ“œ **Tools**: Bash scripts (`exploit.sh`) and curl commands are publicly shared.โ€ฆ

Q7How to self-check? (Features/Scanning)

๐Ÿ” **Self-Check**: Scan for the specific REST endpoint: `/wp-json/am-member/license`. ๐Ÿงช **Test**: Send a POST request with `blowf=system('id')`. If the response contains `uid=33(www-data)`, you are vulnerable!โ€ฆ

Q8Is it fixed officially? (Patch/Mitigation)

๐Ÿฉน **Official Fix**: The data does not list a specific patch date, but the vulnerability is published (Jan 2024). โš ๏ธ **Action**: You must **update** to a version > 9.9.6 immediately if available, or remove the plugin.โ€ฆ

Q9What if no patch? (Workaround)

๐Ÿšง **No Patch Workaround**: 1. **Disable/Remove** the plugin immediately. 2. **Block** the endpoint `/wp-json/am-member/license` via WAF or firewall. 3.โ€ฆ

Q10Is it urgent? (Priority Suggestion)

๐Ÿ”ฅ **Urgency**: **CRITICAL**. ๐Ÿšจ **Priority**: **P0**. Since it is an unauthenticated RCE with public exploits, your server is likely being scanned right now. Patch or mitigate **TODAY**. Do not wait!