CVE-2022-3119: CWE-287 Improper Authentication in Unknown OAuth client Single Sign On for WordPress ( OAuth 2.0 SSO )
The OAuth client Single Sign On WordPress plugin before 3.0.4 does not have authorisation and CSRF when updating its settings, which could allow unauthenticated attackers to update them and change the OAuth endpoints to ones they controls, allowing them to then be authenticated as admin if they know the correct email address
AI Analysis
Technical Summary
CVE-2022-3119 is a high-severity vulnerability affecting the OAuth client Single Sign On (SSO) plugin for WordPress, specifically versions prior to 3.0.4. The flaw arises from improper authentication and lack of Cross-Site Request Forgery (CSRF) protections when updating the plugin's settings. This deficiency allows unauthenticated attackers to modify critical configuration parameters, including the OAuth endpoints. By redirecting these endpoints to attacker-controlled servers, adversaries can manipulate the OAuth authentication flow. If the attacker knows a valid administrator's email address, they can exploit this to authenticate as that admin user without possessing valid credentials. The vulnerability is categorized under CWE-287 (Improper Authentication) and CWE-352 (Cross-Site Request Forgery). The CVSS v3.1 base score is 7.5, reflecting a network attack vector with no privileges or user interaction required, and a high impact on integrity but no impact on confidentiality or availability. No known exploits are reported in the wild as of the publication date, but the potential for privilege escalation and full administrative control over affected WordPress sites is significant. The plugin’s role in enabling OAuth 2.0 SSO means that compromised sites could be fully controlled by attackers, leading to website defacement, data manipulation, or further pivoting within the hosting environment.
Potential Impact
For European organizations using WordPress with the vulnerable OAuth client SSO plugin, this vulnerability poses a serious risk. Successful exploitation grants attackers administrative access, enabling them to alter website content, inject malicious code, steal sensitive data, or deploy ransomware. Given WordPress's widespread use across European businesses, government portals, and e-commerce platforms, the impact could be extensive. Compromised sites could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches), and cause operational disruptions. The lack of authentication and CSRF protections means attackers can exploit this remotely without user interaction, increasing the likelihood of automated attacks. Additionally, attackers could use compromised WordPress sites as a foothold to infiltrate internal networks or launch supply chain attacks. The impact is particularly severe for sectors relying heavily on web presence and customer trust, such as finance, healthcare, and public administration.
Mitigation Recommendations
Organizations should immediately verify the version of the OAuth client Single Sign On plugin installed on their WordPress instances and upgrade to version 3.0.4 or later, where this vulnerability is patched. If upgrading is not immediately possible, restrict access to the WordPress admin dashboard and plugin settings via network-level controls such as IP whitelisting or VPN access. Implement Web Application Firewall (WAF) rules to detect and block unauthorized POST requests targeting the plugin’s settings endpoints. Conduct thorough audits of OAuth configuration settings to detect unauthorized changes. Employ monitoring and alerting for unusual login patterns or configuration modifications. Additionally, enforce strong email address verification and consider multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of account compromise. Regularly review plugin security advisories and maintain a robust patch management process to promptly address emerging vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-3119: CWE-287 Improper Authentication in Unknown OAuth client Single Sign On for WordPress ( OAuth 2.0 SSO )
Description
The OAuth client Single Sign On WordPress plugin before 3.0.4 does not have authorisation and CSRF when updating its settings, which could allow unauthenticated attackers to update them and change the OAuth endpoints to ones they controls, allowing them to then be authenticated as admin if they know the correct email address
AI-Powered Analysis
Technical Analysis
CVE-2022-3119 is a high-severity vulnerability affecting the OAuth client Single Sign On (SSO) plugin for WordPress, specifically versions prior to 3.0.4. The flaw arises from improper authentication and lack of Cross-Site Request Forgery (CSRF) protections when updating the plugin's settings. This deficiency allows unauthenticated attackers to modify critical configuration parameters, including the OAuth endpoints. By redirecting these endpoints to attacker-controlled servers, adversaries can manipulate the OAuth authentication flow. If the attacker knows a valid administrator's email address, they can exploit this to authenticate as that admin user without possessing valid credentials. The vulnerability is categorized under CWE-287 (Improper Authentication) and CWE-352 (Cross-Site Request Forgery). The CVSS v3.1 base score is 7.5, reflecting a network attack vector with no privileges or user interaction required, and a high impact on integrity but no impact on confidentiality or availability. No known exploits are reported in the wild as of the publication date, but the potential for privilege escalation and full administrative control over affected WordPress sites is significant. The plugin’s role in enabling OAuth 2.0 SSO means that compromised sites could be fully controlled by attackers, leading to website defacement, data manipulation, or further pivoting within the hosting environment.
Potential Impact
For European organizations using WordPress with the vulnerable OAuth client SSO plugin, this vulnerability poses a serious risk. Successful exploitation grants attackers administrative access, enabling them to alter website content, inject malicious code, steal sensitive data, or deploy ransomware. Given WordPress's widespread use across European businesses, government portals, and e-commerce platforms, the impact could be extensive. Compromised sites could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches), and cause operational disruptions. The lack of authentication and CSRF protections means attackers can exploit this remotely without user interaction, increasing the likelihood of automated attacks. Additionally, attackers could use compromised WordPress sites as a foothold to infiltrate internal networks or launch supply chain attacks. The impact is particularly severe for sectors relying heavily on web presence and customer trust, such as finance, healthcare, and public administration.
Mitigation Recommendations
Organizations should immediately verify the version of the OAuth client Single Sign On plugin installed on their WordPress instances and upgrade to version 3.0.4 or later, where this vulnerability is patched. If upgrading is not immediately possible, restrict access to the WordPress admin dashboard and plugin settings via network-level controls such as IP whitelisting or VPN access. Implement Web Application Firewall (WAF) rules to detect and block unauthorized POST requests targeting the plugin’s settings endpoints. Conduct thorough audits of OAuth configuration settings to detect unauthorized changes. Employ monitoring and alerting for unusual login patterns or configuration modifications. Additionally, enforce strong email address verification and consider multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of account compromise. Regularly review plugin security advisories and maintain a robust patch management process to promptly address emerging vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-09-04T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682e280cc4522896dcc6c681
Added to database: 5/21/2025, 7:22:52 PM
Last enriched: 7/7/2025, 1:10:31 PM
Last updated: 2/7/2026, 2:02:31 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.