Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-34621 PoC — WordPress 访问控制错误漏洞

Source
Associated Vulnerability
Title:WordPress 访问控制错误漏洞 (CVE-2021-34621)
Description:WordPress是WordPress(Wordpress)基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 WordPress 的 ProfilePress 插件3.0.0 - 3.1.3版本存在安全漏洞,该漏洞源于~/src/Classes/RegistrationAuth.php 文件中的用户注册组件。攻击者可以利用该漏洞以管理员身份在站点上注册。
Description
A PoC exploit for CVE-2021-34621 - WordPress Privilege Escalation
Readme
# CVE-2021-34621 - WordPress Privilege Escalation

A critical vulnerability has been identified in the user registration component of the ProfilePress WordPress plugin. This security flaw, assigned CVE-2021-34621, allows unauthorized users to register on websites with administrator privileges, potentially leading to a complete compromise of the site's security.

# Vulnerable Component

The vulnerability is located in the RegistrationAuth.php file, which is part of the ProfilePress plugin. This component is responsible for handling user registration.

# Affected Versions

The security issue impacts ProfilePress plugin versions 3.0.0 through 3.1.3. Websites using any of these versions are at risk of exploitation.

# Impact

Exploiting this vulnerability enables malicious actors to register on WordPress sites with elevated privileges, granting them unauthorized access to administrative functions and sensitive data. This could lead to full control over the compromised website, unauthorized content manipulation, and potential data breaches.

# Mitigation

Website administrators are strongly advised to take the following actions:

    Immediate Update: Upgrade the ProfilePress plugin to a version beyond 3.1.3, as this vulnerability has been patched in later releases.
    Security Audit: Perform a thorough security audit to identify any signs of unauthorized access or suspicious activities on the affected website.
    User Review: Review the registered user list for any unauthorized or suspicious accounts and revoke their privileges.
    Monitoring: Implement continuous monitoring and intrusion detection mechanisms to promptly detect and respond to any unauthorized actions.

# Disclaimer

This PoC is provided for educational purposes only!
File Snapshot

[4.0K] /data/pocs/ea7989f281eddebe2cca3c7881cda1265a9c1ed8 ├── [3.4K] CVE-2021-34621.py └── [1.7K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.