Vulnerability Description
An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request to the login endpoint. By setting social_site=true and manipulating the user_id_social_site parameter, an attacker can generate a valid WordPress session cookie for any user ID, including administrators. Once authenticated, the attacker may exploit plugin upload functionality to install a malicious plugin containing arbitrary PHP code, resulting in remote code execution on the underlying server.
Related Weaknesses (CWE)
References
- https://github.com/GTSolutions/Pie-Register
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix
- https://pieregister.com/
- https://vulncheck.com/advisories/wordpress-pie-register-plugin-rce
- https://wordpress.org/plugins/pie-register/
- https://www.exploit-db.com/exploits/50395
FAQ
What is CVE-2025-34077?
CVE-2025-34077 is a documented vulnerability. An authentication bypass vulnerability exists in the WordPress Pie Register plugin ≤ 3.7.1.4 that allows unauthenticated attackers to impersonate arbitrary users by submitting a crafted POST request t...
How severe is CVE-2025-34077?
CVSS scoring is not yet available for CVE-2025-34077. Check NVD for updates.
Is there a patch for CVE-2025-34077?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.