Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-50490 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: PegaPoll plugin has a **Missing Authorization** flaw. πŸ“‰ **Consequences**: Attackers can modify arbitrary site options, leading to **Privilege Escalation** and full site takeover. πŸ’₯

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-862** (Missing Authorization). πŸ› **Flaw**: The plugin lacks a capability check, allowing unauthenticated users to execute administrative actions. πŸ”“

Q3Who is affected? (Versions/Components)

🎯 **Affected**: WordPress Plugin **PegaPoll**. πŸ“¦ **Version**: **1.0.2** and earlier. 🏒 **Vendor**: lowcage. ⚠️

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: Update arbitrary options. πŸ”„ **Specific Risk**: Change default registration role to **Administrator**. πŸ‘‘ **Result**: Gain full admin access via user registration. πŸšͺ

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. 🚫 **Auth**: **Unauthenticated** (No login needed). 🌐 **Config**: Network accessible (AV:N). ⚑ Easy to exploit.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Exploit**: **Yes**. πŸ“‚ **PoC**: Available on GitHub (RandomRobbieBF). 🌍 **Status**: Publicly known. 🚨 Wild exploitation risk is high.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Check**: Scan for **PegaPoll** plugin version. πŸ“‹ **Verify**: Check if version is **≀ 1.0.2**. πŸ› οΈ **Tool**: Use vulnerability scanners or manual version check in WP admin. πŸ”

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Fix**: Update PegaPoll plugin to a version **> 1.0.2**. πŸ”„ **Action**: Check vendor for patched release. πŸ“₯ Apply immediately if available. βœ…

Q9What if no patch? (Workaround)

🚧 **Workaround**: **Disable** the PegaPoll plugin if not needed. 🚫 **Block**: Restrict access to plugin endpoints via WAF. πŸ›‘ Prevent unauthorized option updates. πŸ”’

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **CRITICAL**. 🚨 **CVSS**: **9.1** (High). ⚑ **Urgency**: Patch immediately. πŸƒβ€β™‚οΈ Risk of full site compromise is immediate and severe. 🚨