CVE-2025-34077 PUBLISHED

WordPress Pie Register Plugin ≤ 3.7.1.4 Authentication Bypass RCE

Assigner: VulnCheck
Reserved: 15.04.2025 Published: 09.07.2025 Updated: 09.07.2025

An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators. Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 10

Product Status

Vendor Genetech Solutions
Product WordPress Pie Register Plugin
Versions Default: unaffected
  • affected from * to 3.7.1.4 (incl.)

Credits

  • Lotfi13-DZ finder

References

Problem Types

  • CWE-434 Unrestricted Upload of File with Dangerous Type CWE
  • CWE-306 Missing Authentication for Critical Function CWE
  • CWE-94 Improper Control of Generation of Code ('Code Injection') CWE

Impacts

  • CAPEC-115 Authentication Bypass
  • CAPEC-137 Parameter Injection
  • CAPEC-242 Code Injection