CVE-2021-4374
CRITICAL EXPLOITED NUCLEIWordPress Automatic <3.53.2 - Info Disclosure
Title source: llmDescription
The WordPress Automatic Plugin for WordPress is vulnerable to arbitrary options updates in versions up to, and including, 3.53.2. This is due to missing authorization and option validation in the process_form.php file. This makes it possible for unauthenticated attackers to arbitrarily update the settings of a vulnerable site and ultimately compromise the entire site.
Exploits (1)
metasploit
WORKING POC
by h00die, Jerome Bruandet · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/wp_automatic_plugin_privesc.rb
Nuclei Templates (1)
WordPress Automatic Plugin - Unauthenticated Options Change
CRITICALVERIFIEDby intelligent-ears
Shodan:
http.html:"wp-content/plugins/wp-automatic/"
FOFA:
wp-content/plugins/wp-automatic/
Scores
CVSS v3
9.1
EPSS
0.7499
EPSS Percentile
98.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Details
VulnCheck KEV
2021-09-06
CWE
CWE-862
Status
published
Products (2)
ValvePress/WordPress Automatic Plugin
< 3.53.3
valvepress/wordpress_automatic_plugin
< 3.53.2
Published
Jun 07, 2023
Tracked Since
Feb 18, 2026