CVE-2022-3119: CWE-287 Improper Authentication in Unknown OAuth client Single Sign On for WordPress ( OAuth 2.0 SSO )
The OAuth client Single Sign On WordPress plugin before 3.0.4 does not have authorisation and CSRF when updating its settings, which could allow unauthenticated attackers to update them and change the OAuth endpoints to ones they controls, allowing them to then be authenticated as admin if they know the correct email address
AI Analysis
Technical Summary
CVE-2022-3119 is a high-severity vulnerability affecting the OAuth client Single Sign On (SSO) plugin for WordPress, specifically versions prior to 3.0.4. The flaw arises from improper authentication and lack of Cross-Site Request Forgery (CSRF) protections when updating the plugin's settings. This deficiency allows unauthenticated attackers to modify critical configuration parameters, including the OAuth endpoints. By redirecting these endpoints to attacker-controlled servers, adversaries can manipulate the OAuth authentication flow. If the attacker knows a valid administrator's email address, they can exploit this to authenticate as that admin user without possessing valid credentials. The vulnerability is categorized under CWE-287 (Improper Authentication) and CWE-352 (Cross-Site Request Forgery). The CVSS v3.1 base score is 7.5, reflecting a network attack vector with no privileges or user interaction required, and a high impact on integrity but no impact on confidentiality or availability. No known exploits are reported in the wild as of the publication date, but the potential for privilege escalation and full administrative control over affected WordPress sites is significant. The plugin’s role in enabling OAuth 2.0 SSO means that compromised sites could be fully controlled by attackers, leading to website defacement, data manipulation, or further pivoting within the hosting environment.
Potential Impact
For European organizations using WordPress with the vulnerable OAuth client SSO plugin, this vulnerability poses a serious risk. Successful exploitation grants attackers administrative access, enabling them to alter website content, inject malicious code, steal sensitive data, or deploy ransomware. Given WordPress's widespread use across European businesses, government portals, and e-commerce platforms, the impact could be extensive. Compromised sites could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches), and cause operational disruptions. The lack of authentication and CSRF protections means attackers can exploit this remotely without user interaction, increasing the likelihood of automated attacks. Additionally, attackers could use compromised WordPress sites as a foothold to infiltrate internal networks or launch supply chain attacks. The impact is particularly severe for sectors relying heavily on web presence and customer trust, such as finance, healthcare, and public administration.
Mitigation Recommendations
Organizations should immediately verify the version of the OAuth client Single Sign On plugin installed on their WordPress instances and upgrade to version 3.0.4 or later, where this vulnerability is patched. If upgrading is not immediately possible, restrict access to the WordPress admin dashboard and plugin settings via network-level controls such as IP whitelisting or VPN access. Implement Web Application Firewall (WAF) rules to detect and block unauthorized POST requests targeting the plugin’s settings endpoints. Conduct thorough audits of OAuth configuration settings to detect unauthorized changes. Employ monitoring and alerting for unusual login patterns or configuration modifications. Additionally, enforce strong email address verification and consider multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of account compromise. Regularly review plugin security advisories and maintain a robust patch management process to promptly address emerging vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-3119: CWE-287 Improper Authentication in Unknown OAuth client Single Sign On for WordPress ( OAuth 2.0 SSO )
Description
The OAuth client Single Sign On WordPress plugin before 3.0.4 does not have authorisation and CSRF when updating its settings, which could allow unauthenticated attackers to update them and change the OAuth endpoints to ones they controls, allowing them to then be authenticated as admin if they know the correct email address
AI-Powered Analysis
Technical Analysis
CVE-2022-3119 is a high-severity vulnerability affecting the OAuth client Single Sign On (SSO) plugin for WordPress, specifically versions prior to 3.0.4. The flaw arises from improper authentication and lack of Cross-Site Request Forgery (CSRF) protections when updating the plugin's settings. This deficiency allows unauthenticated attackers to modify critical configuration parameters, including the OAuth endpoints. By redirecting these endpoints to attacker-controlled servers, adversaries can manipulate the OAuth authentication flow. If the attacker knows a valid administrator's email address, they can exploit this to authenticate as that admin user without possessing valid credentials. The vulnerability is categorized under CWE-287 (Improper Authentication) and CWE-352 (Cross-Site Request Forgery). The CVSS v3.1 base score is 7.5, reflecting a network attack vector with no privileges or user interaction required, and a high impact on integrity but no impact on confidentiality or availability. No known exploits are reported in the wild as of the publication date, but the potential for privilege escalation and full administrative control over affected WordPress sites is significant. The plugin’s role in enabling OAuth 2.0 SSO means that compromised sites could be fully controlled by attackers, leading to website defacement, data manipulation, or further pivoting within the hosting environment.
Potential Impact
For European organizations using WordPress with the vulnerable OAuth client SSO plugin, this vulnerability poses a serious risk. Successful exploitation grants attackers administrative access, enabling them to alter website content, inject malicious code, steal sensitive data, or deploy ransomware. Given WordPress's widespread use across European businesses, government portals, and e-commerce platforms, the impact could be extensive. Compromised sites could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches), and cause operational disruptions. The lack of authentication and CSRF protections means attackers can exploit this remotely without user interaction, increasing the likelihood of automated attacks. Additionally, attackers could use compromised WordPress sites as a foothold to infiltrate internal networks or launch supply chain attacks. The impact is particularly severe for sectors relying heavily on web presence and customer trust, such as finance, healthcare, and public administration.
Mitigation Recommendations
Organizations should immediately verify the version of the OAuth client Single Sign On plugin installed on their WordPress instances and upgrade to version 3.0.4 or later, where this vulnerability is patched. If upgrading is not immediately possible, restrict access to the WordPress admin dashboard and plugin settings via network-level controls such as IP whitelisting or VPN access. Implement Web Application Firewall (WAF) rules to detect and block unauthorized POST requests targeting the plugin’s settings endpoints. Conduct thorough audits of OAuth configuration settings to detect unauthorized changes. Employ monitoring and alerting for unusual login patterns or configuration modifications. Additionally, enforce strong email address verification and consider multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of account compromise. Regularly review plugin security advisories and maintain a robust patch management process to promptly address emerging vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-09-04T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682e280cc4522896dcc6c681
Added to database: 5/21/2025, 7:22:52 PM
Last enriched: 7/7/2025, 1:10:31 PM
Last updated: 7/31/2025, 8:57:59 PM
Views: 9
Related Threats
CVE-2025-9106: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9105: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumCVE-2025-9101: Cross Site Scripting in zhenfeng13 My-Blog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.