This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Critical Auth Bypass in SureTriggers plugin. π₯ **Consequences**: Attackers can create admin accounts without login. Total site compromise is possible. Data theft and defacement risks are HIGH.
Q2Root Cause? (CWE/Flaw)
π **Root Cause**: CWE-697 (Comparison Error). π **Flaw**: Missing empty value check on the `secret_key` in the `authenticate_user` function. The API accepts requests without proper credentials.
Q3Who is affected? (Versions/Components)
π₯ **Affected**: WordPress Plugin: **SureTriggers**. π¦ **Vendor**: BrainstormForce (OttoKit). π **Versions**: **β€ 1.0.78**. Over 100,000 sites potentially at risk.
Q4What can hackers do? (Privileges/Data)
π **Privileges**: Full **Administrator** access. π **Data**: Complete read/write access to the site. Hackers can install malware, steal user data, or take over the blog.
Q5Is exploitation threshold high? (Auth/Config)
β οΈ **Threshold**: Low to Medium. π« **Auth**: No authentication required (Unauthenticated). βοΈ **Config**: Exploitable if plugin is installed/activated but **NOT configured** with an API key.
π΅οΈ **Self-Check**: Use Nuclei templates or specific PoC scripts. π **Indicator**: Check if SureTriggers is installed (vβ€1.0.78) AND lacks a configured API key. Look for unauthenticated API endpoints.
Q8Is it fixed officially? (Patch/Mitigation)
π‘οΈ **Fix**: Update SureTriggers to **version 1.0.79 or later**. π **Patch**: The vendor released a fix addressing the missing empty value check in the REST controller.
Q9What if no patch? (Workaround)
π§ **Workaround**: If you cannot update immediately: 1. **Deactivate/Uninstall** the plugin if not used. 2. Ensure the plugin is **fully configured** with a valid API key (though update is safer). 3.β¦
π₯ **Urgency**: **CRITICAL**. π **Priority**: Patch IMMEDIATELY. CVSS Score is High (H/I/H/A). Unauthenticated access makes this a top-priority vulnerability for any site running this plugin.