WordPress Plugin Vulnerabilities
Meow Gallery < 4.2.0 - Unauthorised Arbitrary Options Update via REST API
Description
The plugin does not properly check for capability in its REST API, allowing
- Any authenticated user with the upload_file capability (such as author+) to call them in versions before 4.1.9
- Any unauthenticated user to call them except the rest_all_settings endpoint, in 4.1.9
One endpoint in particular could be used to update arbitrary options as there is also no validation done to ensure that the option belong to the plugin (in v < 4.1.6). As a result, attackers can update
- arbitrary options from the blog, such the 'home' which would redirect all users to another website in versions before 4.1.6
- arbitrary options from the plugin since 4.1.6
In 4.2.0, other endpoints were also given proper authorisation checks.
Proof of Concept
Affects Plugins
Classification
Type
ACCESS CONTROLS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
WPScanTeam
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-09-02 (about 4 years ago)
Added
2021-09-02 (about 4 years ago)
Last Updated
2021-09-02 (about 4 years ago)