一、 漏洞 CVE-2025-5288 基础信息
漏洞信息
                                        神龙正在分析中.
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
REST API | Custom API Generator For Cross Platform And Import Export In WP 1.0.0 - 2.0.3 - Missing Authorization to Unauthenticated Privilege Escalation via process_handler Function
来源:美国国家漏洞数据库 NVD
漏洞描述信息
The REST API | Custom API Generator For Cross Platform And Import Export In WP plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the process_handler() function in versions 1.0.0 to 2.0.3. This makes it possible for unauthenticated attackers to POST an arbitrary import_api URL, import specially crafted JSON, and thereby create a new user with full Administrator privileges.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
授权机制缺失
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2025-5288 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2025-5288 的情报信息
  • 标题: REST API | Custom API Generator For Cross Platform And Import Export In WP 1.0.0 - 2.0.3 - Missing Authorization to Unauthenticated Privilege Escalation via process_handler Function -- 🔗来源链接

    标签:

  • 标题: wot-rapi-import-functions.php in import-export-with-custom-rest-api/tags/2.0.3/backend/methods – WordPress Plugin Repository -- 🔗来源链接

    标签:

  • 标题: REST API | Custom API Generator For Cross Platform And Import Export In WP – WordPress plugin | WordPress.org -- 🔗来源链接

    标签:

  • https://nvd.nist.gov/vuln/detail/CVE-2025-5288