Unauthenticated Broken Authentication Vulnerability in WordP... #1421
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Product: Jobmonster (premium WordPress theme). ~5,000+ sales.
Vulnerability: Unauthenticated broken authentication in Social Login handler (CVE-2025-54738). Severity: CVSS 9.8 (Critical).
Affected/Fixed: Observed in
4.7.9
(per advisory slug); fixed in 4.8.0 on August 8, 2025. Update immediately.Where and why it breaks: The Social L...
🔧 Technical Details
Abusing social-login fallbacks in WordPress AJAX: Identify unauthenticated
admin-ajax.php
actions for social login that (1) lack nonce/capability checks and (2) accept a client-supplied identifier (e.g.,id
) as email when provider data is missing/unsupported. Force the code into its default branch withusing
set to an invalid value, supplyid=<victim-email>
, and the handler may callwp_set_auth_cookie()
, creating a logged-in session for that user. This technique yields account takeover wherever social-login handlers trust POSTed identifiers without validating provider responses.🤖 Agent Actions
I analyzed the blog and the HackTricks repository structure and found that the best place to document this technique is the existing WordPress page. HackTricks already has a “WordPress Plugins Pentest” section with similar unauthenticated AJAX and authentication bypass techniques (e.g., cookie-trusted user switching, trusted header impersonation). However, it didn’t specifically cover Social Login handlers abused via admin-ajax.php falling back to a client-supplied email and calling wp_set_auth_cookie(). I added a new section detailing this technique, including the vulnerable pattern, PoC requests, detection, and hardening guidance. I also added the blog to the references.
Changes made:
No new files were created because the existing WordPress page is the appropriate place for this content.
References added:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
🗑️ File Cleanup