Home / CVE DB / CVE-2025-34077
Standard
Vulnerability Identifier

CVE-2025-34077

2025-07-09
Severity Assessment
LOW
CVSS v3.x Score
Clinical Analysis (Description)

An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators. Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server.

Vector Sequencing

Attack Parameters

Impact Consequences

Technical Impact

Weakness Classification

CWE-CWE-94

Timeline

Time Line

PUBLICATION
09 Jul 2025
MODIFICATION
10 Jul 2025
Impact Statistics

Key Metrics

CVSS Score
LOW
Public Exploit Available
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Patch Library
No direct patch listed in database.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.