WordPress Plugin Vulnerabilities

Meow Gallery < 4.2.0 - Unauthorised Arbitrary Options Update via REST API

Description

The plugin does not properly check for capability in its REST API, allowing
- Any authenticated user with the upload_file capability (such as author+) to call them in versions before 4.1.9
- Any unauthenticated user to call them except the rest_all_settings endpoint, in 4.1.9

One endpoint in particular could be used to update arbitrary options as there is also no validation done to ensure that the option belong to the plugin (in v < 4.1.6). As a result, attackers can update
- arbitrary options from the blog, such the 'home' which would redirect all users to another website in versions before 4.1.6
- arbitrary options from the plugin since 4.1.6

In 4.2.0, other endpoints were also given proper authorisation checks.

Proof of Concept

Affects Plugins

Fixed in 4.2.0

Classification

Type
ACCESS CONTROLS
CWE
CVSS

Miscellaneous

Original Researcher
WPScanTeam
Verified
Yes

Timeline

Publicly Published
2021-09-02 (about 4 years ago)
Added
2021-09-02 (about 4 years ago)
Last Updated
2021-09-02 (about 4 years ago)

Other