CVE-2022-3477: CWE-287 Improper Authentication in tagDiv tagDiv Composer
The tagDiv Composer WordPress plugin before 3.5, required by the Newspaper WordPress theme before 12.1 and Newsmag WordPress theme before 5.2.2, does not properly implement the Facebook login feature, allowing unauthenticated attackers to login as any user by just knowing their email address
AI Analysis
Technical Summary
CVE-2022-3477 is a critical security vulnerability identified in the tagDiv Composer WordPress plugin, specifically versions before 3.5. This plugin is a core component required by the popular Newspaper WordPress theme (versions before 12.1) and Newsmag WordPress theme (versions before 5.2.2). The vulnerability arises from improper authentication (CWE-287) in the implementation of the Facebook login feature. Due to flawed validation logic, an unauthenticated attacker can bypass normal authentication controls and log in as any user simply by knowing their email address. This means that no password or additional authentication factors are required, and no user interaction is needed. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity, with attack vector being network-based, no privileges required, no user interaction needed, and full impact on confidentiality, integrity, and availability. Exploiting this flaw allows an attacker to fully compromise user accounts, potentially including administrative accounts, leading to unauthorized access, data theft, content manipulation, or complete site takeover. Although no known exploits in the wild have been reported yet, the ease of exploitation and the critical impact make this a high-risk vulnerability for WordPress sites using the affected themes and plugin versions. The vulnerability was published on November 14, 2022, and is tracked by WPScan and CISA. No official patch links were provided in the data, but upgrading to tagDiv Composer 3.5 or later and the corresponding theme versions is essential to remediate this issue.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites built with the Newspaper or Newsmag themes, which are widely used for news, media, and content publishing. Successful exploitation can lead to unauthorized access to sensitive user data, defacement of websites, injection of malicious content, or use of compromised sites as a platform for further attacks such as phishing or malware distribution. This can result in reputational damage, loss of customer trust, regulatory non-compliance (e.g., GDPR violations due to data breaches), and financial losses. Given the critical nature of the vulnerability and the fact that it requires only an email address to exploit, attackers can target high-profile European media outlets or corporate blogs to disrupt operations or steal confidential information. The impact extends beyond just the compromised website, as attackers could leverage access to pivot into internal networks if the WordPress instance is integrated with other enterprise systems.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify if they are using affected versions of the tagDiv Composer plugin and the Newspaper or Newsmag themes. The primary mitigation is to upgrade tagDiv Composer to version 3.5 or later, and update the Newspaper theme to version 12.1 or later, and Newsmag theme to version 5.2.2 or later, where the authentication flaw has been fixed. If immediate upgrades are not feasible, temporarily disabling the Facebook login feature within the plugin settings can reduce exposure. Additionally, organizations should implement monitoring for unusual login activities, especially logins without corresponding password authentication. Enforcing multi-factor authentication (MFA) on WordPress accounts, where possible, adds an additional layer of defense. Regularly auditing user accounts and removing inactive or suspicious accounts can limit potential damage. Web application firewalls (WAFs) with custom rules to detect and block suspicious login attempts based on email enumeration patterns may also help. Finally, maintaining regular backups of website data ensures recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2022-3477: CWE-287 Improper Authentication in tagDiv tagDiv Composer
Description
The tagDiv Composer WordPress plugin before 3.5, required by the Newspaper WordPress theme before 12.1 and Newsmag WordPress theme before 5.2.2, does not properly implement the Facebook login feature, allowing unauthenticated attackers to login as any user by just knowing their email address
AI-Powered Analysis
Technical Analysis
CVE-2022-3477 is a critical security vulnerability identified in the tagDiv Composer WordPress plugin, specifically versions before 3.5. This plugin is a core component required by the popular Newspaper WordPress theme (versions before 12.1) and Newsmag WordPress theme (versions before 5.2.2). The vulnerability arises from improper authentication (CWE-287) in the implementation of the Facebook login feature. Due to flawed validation logic, an unauthenticated attacker can bypass normal authentication controls and log in as any user simply by knowing their email address. This means that no password or additional authentication factors are required, and no user interaction is needed. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity, with attack vector being network-based, no privileges required, no user interaction needed, and full impact on confidentiality, integrity, and availability. Exploiting this flaw allows an attacker to fully compromise user accounts, potentially including administrative accounts, leading to unauthorized access, data theft, content manipulation, or complete site takeover. Although no known exploits in the wild have been reported yet, the ease of exploitation and the critical impact make this a high-risk vulnerability for WordPress sites using the affected themes and plugin versions. The vulnerability was published on November 14, 2022, and is tracked by WPScan and CISA. No official patch links were provided in the data, but upgrading to tagDiv Composer 3.5 or later and the corresponding theme versions is essential to remediate this issue.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites built with the Newspaper or Newsmag themes, which are widely used for news, media, and content publishing. Successful exploitation can lead to unauthorized access to sensitive user data, defacement of websites, injection of malicious content, or use of compromised sites as a platform for further attacks such as phishing or malware distribution. This can result in reputational damage, loss of customer trust, regulatory non-compliance (e.g., GDPR violations due to data breaches), and financial losses. Given the critical nature of the vulnerability and the fact that it requires only an email address to exploit, attackers can target high-profile European media outlets or corporate blogs to disrupt operations or steal confidential information. The impact extends beyond just the compromised website, as attackers could leverage access to pivot into internal networks if the WordPress instance is integrated with other enterprise systems.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify if they are using affected versions of the tagDiv Composer plugin and the Newspaper or Newsmag themes. The primary mitigation is to upgrade tagDiv Composer to version 3.5 or later, and update the Newspaper theme to version 12.1 or later, and Newsmag theme to version 5.2.2 or later, where the authentication flaw has been fixed. If immediate upgrades are not feasible, temporarily disabling the Facebook login feature within the plugin settings can reduce exposure. Additionally, organizations should implement monitoring for unusual login activities, especially logins without corresponding password authentication. Enforcing multi-factor authentication (MFA) on WordPress accounts, where possible, adds an additional layer of defense. Regularly auditing user accounts and removing inactive or suspicious accounts can limit potential damage. Web application firewalls (WAFs) with custom rules to detect and block suspicious login attempts based on email enumeration patterns may also help. Finally, maintaining regular backups of website data ensures recovery in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-10-12T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983ac4522896dcbed822
Added to database: 5/21/2025, 9:09:14 AM
Last enriched: 7/2/2025, 3:26:31 AM
Last updated: 8/9/2025, 9:13:11 AM
Views: 18
Related Threats
CVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumCVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP
HighCVE-2025-47444: CWE-201 Insertion of Sensitive Information Into Sent Data in Liquid Web GiveWP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.