WordPress Plugin Vulnerabilities
Merge + Minify + Refresh < 1.10.8 - Authenticated Arbitrary File Delete
Description
The plugin relied on the is_admin() check, without checking the user's capabilities, when deleting arbitrary files.
The functionality was also vulnerable to Cross-site Request Forgery (CSRF) allowing attackers to delete arbitrary files by tricking authenticated users into visiting a page they controlled.
In WordPress, if the wp-config.php file is deleted, it triggers the installation process, allowing an attacker to re-install WordPress and become admin.
Proof of Concept
Affects Plugins
References
Classification
Type
AUTHBYPASS
OWASP top 10
CWE
Miscellaneous
Original Researcher
Glyn Wintle (Tradecraft)
Verified
No
WPVDB ID
Timeline
Publicly Published
2020-02-05 (about 6 years ago)
Added
2020-03-09 (about 6 years ago)
Last Updated
2020-03-10 (about 6 years ago)