# WP Page Permalink Extension 认证用户重写规则刷新漏洞
## 概述
WP Page Permalink Extension 插件中的 `cwpp_trigger_flush_rewrite_rules` 函数缺少授权检查,导致存在缺失授权漏洞。
## 影响版本
所有版本至 1.5.4(含)
## 细节
该漏洞存在于 `wp_ajax_cwpp_trigger_flush_rewrite_rules` 钩子绑定的 `cwpp_trigger_flush_rewrite_rules` 函数中,未对用户权限进行验证。
## 影响
经身份验证的攻击者(拥有订阅者及以上权限)可通过 `action` 参数触发重写规则刷新,可能导致网站路由异常或配置重置。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | The WP Page Permalink Extension plugin (<= 1.5.4) allows authenticated users with insufficient privileges to trigger the AJAX action cwpp_trigger_flush_rewrite_rules due to missing authorization checks. | https://github.com/RootHarpy/CVE-2025-14172-Nuclei-Template | POC详情 |
标题: ERROR: The request could not be satisfied -- 🔗来源链接
标签:
神龙速读:
- **Error Code**: 403
- **Error Message**: The request could not be satisfied.
- **Details**:
- Request blocked.
- We can't connect to the server for this app or website at this time.
- There might be too much traffic or a configuration error.
- Suggestion: Try again later, or contact the app or website owner.
- If you provide content to customers through CloudFront, review the CloudFront documentation for troubleshooting.
- **Generated by**: CloudFront (CloudFront)
- **Request ID**: bzojZJPhR0DnyBvByvmrvkQ.yEV8PszaGeaVe.Zbacjdf09NWIaVw==
暂无评论