WP Like Button <= 1.6.0 - Auth Bypass



Description
Authentication Bypass vulnerability in the WP Like Button (Free) plugin
version 1.6.0 allows unauthenticated attackers to change the settings of
the plugin. The contains() function in wp_like_button.php did not check if
the current request is made by an authorized user, thus allowing any
unauthenticated user to successfully update the settings of the plugin.

Edit (WPScanTeam):

The plugin is still vulnerable, and the issue had been escalated to the WP Plugins Team on July 8th as the developer has been silent (see original advisory)
Proof of Concept
The PoC will be released once the issue has been remediated

Affects Plugin

References

CVE 2019-13344
EXPLOITDB 47078
PACKETSTORM 153541
URL https://limbenjamin.com/articles/wp-like-button-auth-bypass.html

Classification

Type AUTHBYPASS
OWASP Top 10 A2: Broken Authentication and Session Management
CWE CWE-287

Miscellaneous

Original Researcher Benjamin Lim
Submitter Benjamin Lim
Submitter Website limbenjamin.com
Views 703
Verified Yes
WPVDB ID 9432

Timeline

Publicly Published 2019-07-05 (19 days ago)
Added 2019-07-09 (14 days ago)
Last Updated 2019-07-09 (14 days ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin