Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-34077— WordPress Pie Register Plugin ≤ 3.7.1.4 Authentication Bypass RCE

EPSS 76.24% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-34077

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
WordPress Pie Register Plugin ≤ 3.7.1.4 Authentication Bypass RCE
Source: NVD (National Vulnerability Database)
Vulnerability Description
An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators. Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
危险类型文件的不加限制上传
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress plugin Pie Register 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Pie Register 3.7.1.4版本存在安全漏洞,该漏洞源于身份验证绕过,可能导致远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Genetech SolutionsWordPress Pie Register Plugin * ~ 3.7.1.4 -

II. Public POCs for CVE-2025-34077

#POC DescriptionSource LinkShenlong Link
1 WordPress Pie Register ≤ 3.7.1.4 - Admin Privilege Escalation (Unauthenticated)https://github.com/MrjHaxcore/CVE-2025-34077POC Details
2An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators.Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-34077.yamlPOC Details
3Poc for Unauthenticated Admin Session Hijack - Pie Register Plugin (≤ 3.7.1.4)https://github.com/0xgh057r3c0n/CVE-2025-34077POC Details
4Poc for Unauthenticated Admin Session Hijack - Pie Register Plugin (≤ 3.7.1.4)https://github.com/zr1p3r/CVE-2025-34077POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-34077

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-34077

No comments yet


Leave a comment