// For flags

CVE-2022-3119

OAuth client Single Sign On for WordPress < 3.0.4 - Unauthenticated Settings Update to Authentication Bypass

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The OAuth client Single Sign On WordPress plugin before 3.0.4 does not have authorisation and CSRF when updating its settings, which could allow unauthenticated attackers to update them and change the OAuth endpoints to ones they controls, allowing them to then be authenticated as admin if they know the correct email address

El cliente OAuth Single Sign On plugin de WordPress versiones anteriores a 3.0.4, no presenta autorización y de tipo CSRF cuando es actualizada su configuración, lo que podría permitir a atacantes no autenticados actualizarlos y cambiar los endpoints OAuth a los que ellos controlan, permitiéndoles entonces ser autenticados como admin si conocen la dirección de correo electrónico correcta

The OAuth client Single Sign On for WordPress ( OAuth 2.0 SSO ) plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the save_oauthclient_config() function that is hooked via 'init' in versions up to, and including, 3.0.3. This makes it possible for unauthenticated attackers to modify the plugin's oAuth settings which could lead to unauthorized and high privileged access to a vulnerable site.

*Credits: Lana Codes
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-08-23 CVE Published
  • 2022-09-04 CVE Reserved
  • 2024-04-18 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-287: Improper Authentication
  • CWE-352: Cross-Site Request Forgery (CSRF)
  • CWE-862: Missing Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oauth Client Single Sign On Project
Search vendor "Oauth Client Single Sign On Project"
Oauth Client Single Sign On
Search vendor "Oauth Client Single Sign On Project" for product "Oauth Client Single Sign On"
< 3.0.4
Search vendor "Oauth Client Single Sign On Project" for product "Oauth Client Single Sign On" and version " < 3.0.4"
wordpress
Affected