Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-9106 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Critical Auth Bypass in Wechat Social Login plugin. <br>πŸ’₯ **Consequences**: Attackers can log in as ANY user (even Admins) without passwords. Total site compromise possible.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-288**: Authentication Bypass. <br>πŸ” **Flaw**: Insufficient verification of the user ID during social login. The system trusts the supplied `uid` without checking if it matches the authenticated session.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: xunhuweb. <br>πŸ“‰ **Affected**: Wechat Social login plugin versions **≀ 1.3.0**. <br>🌐 **Platform**: WordPress sites using this specific plugin.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Full Admin access if `uid=1` (or admin ID) is known. <br>πŸ“‚ **Data**: Complete read/write access to the WordPress site. <br>πŸ”“ **Identity**: Impersonate ANY existing user.

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: LOW. <br>πŸ”‘ **Auth**: None required (Unauthenticated). <br>βš™οΈ **Config**: Exploitable ONLY if the App Secret is NOT set (default empty value). If secret is set, this specific bypass may be blocked.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploit**: YES. Public PoC available on GitHub (RandomRobbieBF). <br>🌍 **Status**: Active exploitation possible. Simple script to swap `uid` parameter.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for plugin version **1.3.0 or lower**. <br>βš™οΈ **Config Check**: Verify if 'App Secret' is configured in Wechat Social Login settings. Empty secret = High Risk.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update plugin to version **> 1.3.0**. <br>βœ… **Status**: Patch released by vendor. Official fix addresses the ID verification flaw.

Q9What if no patch? (Workaround)

🚧 **Workaround**: **Set the App Secret** immediately. <br>🚫 **Alternative**: Disable the plugin if not needed. <br>πŸ”’ **Note**: Without a secret, the vulnerability remains open.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **CRITICAL**. <br>⏱️ **Urgency**: Patch NOW. <br>πŸ“‰ **Risk**: CVSS 9.8 (High). Easy to exploit, high impact. Do not ignore.