# HyperComments <= 1.2.2 - 未经身份验证(订阅者+)任意选项更新
## 概述
HyperComments插件的`hc_request_handler`函数中由于缺少能力检查,导致未经授权的数据修改,从而可能引发权限提升。
## 影响版本
所有版本直到包括1.2.2
## 细节
此漏洞允许未认证的攻击者更新WordPress站点上的任意选项。攻击者可以将默认注册角色设置为管理员并启用用户注册,从而获取管理用户访问权限。
## 影响
攻击者可以未经授权地修改站点数据并获得管理员权限。
                                        
                                    
                                | # | POC 描述 | 源链接 | 神龙链接 | 
|---|---|---|---|
| 1 | WordPress HyperComments Plugin <= 1.2.2 is vulnerable to Privilege Escalation | https://github.com/Nxploited/CVE-2025-5701 | POC详情 | 
| 2 | HyperComments <= 1.2.2 - Unauthenticated (Subscriber+) Arbitrary Options Update | https://github.com/RandomRobbieBF/CVE-2025-5701 | POC详情 | 
| 3 | The HyperComments plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hc_request_handler function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-5701.yaml | POC详情 | 
标题: HyperComments <= 1.2.2 - Unauthenticated (Subscriber+) Arbitrary Options Update -- 🔗来源链接
标签:
神龙速读暂无评论