Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-11171 PoC — WordPress plugin Chartify 访问控制错误漏洞

Source
Associated Vulnerability
Title:WordPress plugin Chartify 访问控制错误漏洞 (CVE-2025-11171)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin Chartify 3.5.9及之前版本存在访问控制错误漏洞,该漏洞源于缺少身份验证和非检查,可能导致未经验证的攻击者执行管理功能。
Description
CVE-2025-11171
Readme
 CVE-2025-11171: Missing Authentication in Chartify WordPress Plugin

[![CVE](https://img.shields.io/badge/CVE-2025--11171-red)](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11171)
[![CVSS Score](https://img.shields.io/badge/CVSS-5.3%20Medium-orange)](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator)
[![WordPress Plugin](https://img.shields.io/badge/WordPress-Plugin-blue)](https://wordpress.org/plugins/chart-builder/)
[![CWE-306](https://img.shields.io/badge/CWE-306-critical)](https://cwe.mitre.org/data/definitions/306.html)
[![Wordfence](https://img.shields.io/badge/Disclosed-Wordfence-success)](https://www.wordfence.com/)

> **Keywords:** CVE-2025-11171, Chartify WordPress vulnerability, missing authentication, WordPress security, unauthenticated AJAX exploit, WordPress plugin vulnerability, CWE-306, WordPress chart plugin security, authentication bypass, WordPress CVE 2025

## Table of Contents

- [Overview](#overview)
- [Vulnerability Details](#vulnerability-details)
- [Technical Analysis](#technical-details)
- [Attack Vector](#attack-vector)
- [Remediation Guide](#remediation)
- [CVSS Metrics](#cvss-v31-metrics)
- [References](#references)
- [Security Contact](#contact)

## Overview

**Chartify WordPress Plugin Authentication Bypass Vulnerability (CVE-2025-11171)** - Critical security flaw allowing unauthenticated access to administrative functions in WordPress chart building plugin.

A critical authentication bypass vulnerability was discovered in the Chartify WordPress Chart Plugin that allows unauthenticated attackers to execute administrative functions.

**Discovered by:** Kai Aizen & Avraham Shemesh (SnailSploit)  
**Published:** October 7, 2025  
**CVSS Score:** 5.3 (Medium)  
**CWE:** CWE-306 - Missing Authentication for Critical Function  
**Plugin:** Chartify – WordPress Chart Plugin  
**Attack Type:** Unauthenticated AJAX Admin Function Execution  
**Required Privileges:** None (Unauthenticated Attack)

## Vulnerability Details

### Description

The Chartify WordPress Chart Plugin contains a missing authentication vulnerability in all versions up to and including 3.5.9. The plugin registers an unauthenticated AJAX action that dispatches to admin-class methods based on a request parameter without any nonce or capability checks.

### Impact

This vulnerability allows unauthenticated attackers to:
- Execute administrative functions via the `wp-admin/admin-ajax.php` endpoint
- Bypass authentication controls
- Potentially manipulate plugin settings and data

### Affected Versions

- **Vulnerable:** All versions ≤ 3.5.9
- **Patched:** Version 3.6.0 and above

### CVSS v3.1 Metrics

```
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
```

| Metric | Value |
|--------|-------|
| Attack Vector | Network (AV:N) |
| Attack Complexity | Low (AC:L) |
| Privileges Required | None (PR:N) |
| User Interaction | None (UI:N) |
| Scope | Unchanged (S:U) |
| Confidentiality | None (C:N) |
| Integrity | Low (I:L) |
| Availability | None (A:N) |

## Technical Details

The vulnerability exists in the AJAX handler implementation where:

1. The plugin registers an unauthenticated AJAX action
2. This action dispatches to admin-class methods based on request parameters
3. No nonce validation is performed
4. No capability checks are implemented
5. Attackers who can identify callable method names can invoke them directly

### Attack Vector

```
POST /wp-admin/admin-ajax.php
```

The vulnerability can be exploited through the WordPress admin-ajax.php endpoint without authentication, provided the attacker can identify valid method names.

## Remediation

### For Site Administrators

**Immediate Action Required:**

1. Update to Chartify version **3.6.0** or later immediately
2. Review your site's access logs for suspicious AJAX requests to `admin-ajax.php`
3. If you cannot update immediately, consider temporarily disabling the plugin

### Update Instructions

1. Navigate to **Plugins > Installed Plugins** in WordPress admin
2. Locate "Chartify – WordPress Chart Plugin"
3. Click **Update Now** to upgrade to version 3.6.0 or later
4. Verify the update was successful

### For Developers

Ensure all AJAX handlers implement proper security controls:

```php
// Example of proper AJAX security
add_action('wp_ajax_your_action', 'your_callback');

function your_callback() {
    // Verify nonce
    check_ajax_referer('your_nonce_action', 'nonce');
    
    // Check capabilities
    if (!current_user_can('manage_options')) {
        wp_die('Unauthorized');
    }
    
    // Your secure code here
}
```

## Timeline

- **October 7, 2025** - Vulnerability publicly disclosed
- **October 8, 2025** - CVE record updated
- **Version 3.6.0** - Patch released by plugin vendor

## References

- [Wordfence Intelligence Database Entry](https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/chart-builder/chartify-wordpress-chart-plugin-359-missing-authentication-for-administrative-function)
- [WordPress Plugin Trac](https://plugins.trac.wordpress.org/browser/chart-builder)
- [MITRE CVE Entry](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11171)

## Credits

**Researchers:**  
- **Kai Aizen** - SnailSploit  
- **Avraham Shemesh** - SnailSploit

**Disclosure Process:** Coordinated through Wordfence Bug Bounty Program

## Disclaimer

This information is provided for security research and defensive purposes only. Any exploitation of this vulnerability for malicious purposes is illegal and unethical. Always obtain proper authorization before testing systems you do not own.

## Contact

For questions or additional information about this vulnerability:
- **Email:** kai@owasp.com
- **Website:** [snailsploit.com](https://snailsploit.com)
- **Organization:** SnailSploit Security Research

---



*Last updated: October 13, 2025*
File Snapshot

[4.0K] /data/pocs/7be7f3ac8416e78d45dded77ede4369430abe245 └── [5.7K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.