I went for coffee and came back with 6 vulnerabilities in WordPress plugins
嗯,用户让我用中文总结一下这篇文章的内容,控制在一百个字以内,而且不需要特定的开头。我先看看文章内容。文章提到了六个WordPress插件的安全漏洞,每个漏洞都有不同的类型,比如文件上传、CSS注入、SQL注入、SSRF和开放重定向。 我需要把这些漏洞的主要信息浓缩到一百字以内。首先,确定每个漏洞的类型和影响:ElementorAddon有任意文件上传,AppointmentHourBooking有CSS注入,TutorLMS有SQL注入,BetterWPSecurity和SAMLSSO有SSRF,WooCommerce有开放重定向。 然后,把这些信息用简洁的语言表达出来。可能需要合并类似的内容,比如两个SSRF漏洞可以一起说。同时要注意不要遗漏关键点,比如攻击者可能窃取数据或权限提升。 最后,确保语言流畅自然,不超过字数限制。可能需要调整句子结构,使其更紧凑。 </think> 文章介绍了六个WordPress插件的安全漏洞,包括任意文件上传、CSS注入、SQL注入、SSRF攻击和开放重定向等,揭示了这些漏洞可能导致的数据泄露、权限提升和恶意行为风险。 2026-4-11 15:47:56 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

1. Royal Elementor Addons — Arbirary File Upload

We explore how a poorly secured AJAX endpoint allows any anonymous user (without being logged in) to upload files to the server. The vulnerability lies in the use of a globally exposed nonce in the frontend and the lack of capability validation in the handle_file_upload function. We demonstrate how to upload a .txt file (as a proof of concept) that becomes publicly accessible in the uploads directory, opening the door to malware and phishing attacks.

2. Appointment Hour Booking — CSS Injection

A user with the Editor role can inject arbitrary CSS code that is rendered across the entire site. Since saving custom styles is not restricted to administrators only, an attacker can perform a full defacement, create transparent phishing overlays to steal higher-privileged admin credentials, or exfiltrate data using CSS selectors.

3. Tutor LMS — SQL Injection

An Error-Based SQL injection in the status parameter of the withdrawals model. The issue occurs because the plugin relies on sanitize_text_field() to protect SQL queries, an unsafe practice that does not escape single quotes. We demonstrate how an attacker with management-level permissions can use EXTRACTVALUE to extract the administrator’s password hash directly from the database.

Get Miguel Méndez Z.’s stories in your inbox

Join Medium for free to get updates from this writer.

Remember me for faster sign in

4. Better WP Security — SSRF

A REST API endpoint allows an administrator to force the server to perform external HTTP requests. Due to the lack of validation of the provided URL destination, the server can be used as a proxy to scan the internal corporate network or, even worse, to access cloud service metadata (AWS/GCP/Azure) and steal infrastructure credentials.

5. SAML SSO — SSRF

The IdP metadata import endpoint accepts arbitrary URLs without internal network validation. We demonstrate how an attacker can direct the request to loopback addresses (127.0.0.1) or protected internal services, exploiting the fact that the WordPress server blindly trusts the provided URL to retrieve XML configurations.

6. WooCommerce — Open Redirect

We analyze an Open Redirect vulnerability in the authorization component of the WooCommerce REST API (WC_Auth). The issue allows an attacker to supply an arbitrary return_url parameter that is not validated against a whitelist of allowed domains. We demonstrate how an attacker can disguise a legitimate authorization link so that, once the administrator approves the permissions, they are automatically redirected to a malicious phishing site. The use of wp_redirect() instead of wp_safe_redirect() is the core technical flaw explored in this flow.


文章来源: https://infosecwriteups.com/i-went-for-coffee-and-came-back-with-6-vulnerabilities-in-wordpress-plugins-8f98fd40ef90?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh