CVE-2025-34077
LowVulnerability Description
An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators. Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server.
References & Resources
-
https://github.com/GTSolutions/Pie-Registerdisclosure@vulncheck.com
-
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_pie_register_bypass_rce.rbdisclosure@vulncheck.com
-
https://pieregister.com/disclosure@vulncheck.com
-
https://vulncheck.com/advisories/wordpress-pie-register-plugin-rcedisclosure@vulncheck.com
-
https://wordpress.org/plugins/pie-register/disclosure@vulncheck.com
-
https://www.exploit-db.com/exploits/50395disclosure@vulncheck.com
Severity Details
Key Information
- Published Date
- July 09, 2025
