The WPGraphQL 0.2.3 plugin for WordPress allows remote attackers to register a new user with admin privileges, whenever new user registrations are allowed. This is related to the registerUser mutation.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html | Exploit Third Party Advisory VDB Entry |
https://github.com/pentestpartners/snippets/blob/master/wp-graphql0.2.3_exploit.py | Exploit Third Party Advisory |
https://github.com/wp-graphql/wp-graphql/releases/tag/v0.3.0 | Release Notes Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9282 | Vendor Advisory |
https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql/ | Exploit Third Party Advisory |
Configurations
History
22 Jan 2024, 15:39
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wpengine:wpgraphql:0.2.3:*:*:*:*:wordpress:*:* |
Information
Published : 2019-06-10 18:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-9879
Mitre link : CVE-2019-9879
CVE.ORG link : CVE-2019-9879
JSON object : View
Products Affected
wpengine
- wpgraphql
CWE
CWE-306
Missing Authentication for Critical Function