Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Genetech Solutions | WordPress Pie Register Plugin | * ~ 3.7.1.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WordPress Pie Register ≤ 3.7.1.4 - Admin Privilege Escalation (Unauthenticated) | https://github.com/MrjHaxcore/CVE-2025-34077 | POC Details |
| 2 | An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators.Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-34077.yaml | POC Details |
| 3 | Poc for Unauthenticated Admin Session Hijack - Pie Register Plugin (≤ 3.7.1.4) | https://github.com/0xgh057r3c0n/CVE-2025-34077 | POC Details |
| 4 | Poc for Unauthenticated Admin Session Hijack - Pie Register Plugin (≤ 3.7.1.4) | https://github.com/zr1p3r/CVE-2025-34077 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet