CVE-2021-4374

CRITICAL EXPLOITED NUCLEI

WordPress Automatic <3.53.2 - Info Disclosure

Title source: llm

Description

The WordPress Automatic Plugin for WordPress is vulnerable to arbitrary options updates in versions up to, and including, 3.53.2. This is due to missing authorization and option validation in the process_form.php file. This makes it possible for unauthenticated attackers to arbitrarily update the settings of a vulnerable site and ultimately compromise the entire site.

Exploits (1)

metasploit WORKING POC
by h00die, Jerome Bruandet · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/wp_automatic_plugin_privesc.rb

Nuclei Templates (1)

WordPress Automatic Plugin - Unauthenticated Options Change
CRITICALVERIFIEDby intelligent-ears
Shodan: http.html:"wp-content/plugins/wp-automatic/"
FOFA: wp-content/plugins/wp-automatic/

Scores

CVSS v3 9.1
EPSS 0.7499
EPSS Percentile 98.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Details

VulnCheck KEV 2021-09-06
CWE
CWE-862
Status published
Products (2)
ValvePress/WordPress Automatic Plugin < 3.53.3
valvepress/wordpress_automatic_plugin < 3.53.2
Published Jun 07, 2023
Tracked Since Feb 18, 2026