Skip to main content

CVE-2022-3119: CWE-287 Improper Authentication in Unknown OAuth client Single Sign On for WordPress ( OAuth 2.0 SSO )

High
VulnerabilityCVE-2022-3119cvecve-2022-3119cwe-287cwe-352
Published: Mon Sep 26 2022 (09/26/2022, 12:35:44 UTC)
Source: CVE
Vendor/Project: Unknown
Product: OAuth client Single Sign On for WordPress ( OAuth 2.0 SSO )

Description

The OAuth client Single Sign On WordPress plugin before 3.0.4 does not have authorisation and CSRF when updating its settings, which could allow unauthenticated attackers to update them and change the OAuth endpoints to ones they controls, allowing them to then be authenticated as admin if they know the correct email address

AI-Powered Analysis

AILast updated: 07/07/2025, 13:10:31 UTC

Technical Analysis

CVE-2022-3119 is a high-severity vulnerability affecting the OAuth client Single Sign On (SSO) plugin for WordPress, specifically versions prior to 3.0.4. The flaw arises from improper authentication and lack of Cross-Site Request Forgery (CSRF) protections when updating the plugin's settings. This deficiency allows unauthenticated attackers to modify critical configuration parameters, including the OAuth endpoints. By redirecting these endpoints to attacker-controlled servers, adversaries can manipulate the OAuth authentication flow. If the attacker knows a valid administrator's email address, they can exploit this to authenticate as that admin user without possessing valid credentials. The vulnerability is categorized under CWE-287 (Improper Authentication) and CWE-352 (Cross-Site Request Forgery). The CVSS v3.1 base score is 7.5, reflecting a network attack vector with no privileges or user interaction required, and a high impact on integrity but no impact on confidentiality or availability. No known exploits are reported in the wild as of the publication date, but the potential for privilege escalation and full administrative control over affected WordPress sites is significant. The plugin’s role in enabling OAuth 2.0 SSO means that compromised sites could be fully controlled by attackers, leading to website defacement, data manipulation, or further pivoting within the hosting environment.

Potential Impact

For European organizations using WordPress with the vulnerable OAuth client SSO plugin, this vulnerability poses a serious risk. Successful exploitation grants attackers administrative access, enabling them to alter website content, inject malicious code, steal sensitive data, or deploy ransomware. Given WordPress's widespread use across European businesses, government portals, and e-commerce platforms, the impact could be extensive. Compromised sites could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches), and cause operational disruptions. The lack of authentication and CSRF protections means attackers can exploit this remotely without user interaction, increasing the likelihood of automated attacks. Additionally, attackers could use compromised WordPress sites as a foothold to infiltrate internal networks or launch supply chain attacks. The impact is particularly severe for sectors relying heavily on web presence and customer trust, such as finance, healthcare, and public administration.

Mitigation Recommendations

Organizations should immediately verify the version of the OAuth client Single Sign On plugin installed on their WordPress instances and upgrade to version 3.0.4 or later, where this vulnerability is patched. If upgrading is not immediately possible, restrict access to the WordPress admin dashboard and plugin settings via network-level controls such as IP whitelisting or VPN access. Implement Web Application Firewall (WAF) rules to detect and block unauthorized POST requests targeting the plugin’s settings endpoints. Conduct thorough audits of OAuth configuration settings to detect unauthorized changes. Employ monitoring and alerting for unusual login patterns or configuration modifications. Additionally, enforce strong email address verification and consider multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of account compromise. Regularly review plugin security advisories and maintain a robust patch management process to promptly address emerging vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-09-04T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682e280cc4522896dcc6c681

Added to database: 5/21/2025, 7:22:52 PM

Last enriched: 7/7/2025, 1:10:31 PM

Last updated: 7/31/2025, 8:57:59 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats