This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis โ
Q1What is this vulnerability? (Essence + Consequences)
๐จ **Essence**: A Broken Access Control flaw in YARPP. ๐ **Consequences**: Unauthenticated attackers can modify plugin settings (display types), leading to unauthorized configuration changes.
๐ฆ **Affected**: WordPress Plugin **YARPP** (Yet Another Related Posts Plugin). ๐ **Versions**: 5.30.10 and earlier. ๐ข **Vendor**: YARPP/WordPress Foundation ecosystem.
Q4What can hackers do? (Privileges/Data)
๐ป **Attacker Action**: Set display types without login. ๐ **Privileges**: Unauthenticated (No login needed). ๐ **Impact**: Low Integrity (I:L), No Confidentiality/Availability loss. CVSS 5.3.
๐ **Exploit**: YES. Public PoC exists on GitHub (RandomRobbieBF). ๐ก **Scanning**: Nuclei templates available. โ ๏ธ **Status**: Active exploitation potential due to simplicity.
Q7How to self-check? (Features/Scanning)
๐ **Check**: Scan for YARPP version โค 5.30.10. ๐งช **Test**: Attempt to access `yarpp_pro_set_display_types.php` without auth. ๐ ๏ธ **Tools**: Use Nuclei or manual HTTP requests to verify missing 403/401 responses.
Q8Is it fixed officially? (Patch/Mitigation)
๐ ๏ธ **Fix**: Upgrade YARPP to version > 5.30.10. โ **Official**: Patch released by vendor. ๐ **Action**: Update plugin immediately via WordPress dashboard.
Q9What if no patch? (Workaround)
๐ง **Workaround**: Disable the plugin if not critical. ๐ซ **Block**: Restrict access to `/includes/yarpp_pro_set_display_types.php` via WAF or `.htaccess`. ๐ฎ **Monitor**: Watch for unexpected display type changes.
Q10Is it urgent? (Priority Suggestion)
โก **Priority**: MEDIUM-HIGH. ๐ **Published**: Nov 1, 2024. ๐ฏ **Reason**: No auth required + Public PoC. ๐ก๏ธ **Advice**: Patch ASAP to prevent unauthorized config manipulation.