Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-3477: CWE-287 Improper Authentication in tagDiv tagDiv Composer

0
Critical
VulnerabilityCVE-2022-3477cvecve-2022-3477cwe-287
Published: Mon Nov 14 2022 (11/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: tagDiv
Product: tagDiv Composer

Description

The tagDiv Composer WordPress plugin before 3.5, required by the Newspaper WordPress theme before 12.1 and Newsmag WordPress theme before 5.2.2, does not properly implement the Facebook login feature, allowing unauthenticated attackers to login as any user by just knowing their email address

AI-Powered Analysis

AILast updated: 07/02/2025, 03:26:31 UTC

Technical Analysis

CVE-2022-3477 is a critical security vulnerability identified in the tagDiv Composer WordPress plugin, specifically versions before 3.5. This plugin is a core component required by the popular Newspaper WordPress theme (versions before 12.1) and Newsmag WordPress theme (versions before 5.2.2). The vulnerability arises from improper authentication (CWE-287) in the implementation of the Facebook login feature. Due to flawed validation logic, an unauthenticated attacker can bypass normal authentication controls and log in as any user simply by knowing their email address. This means that no password or additional authentication factors are required, and no user interaction is needed. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity, with attack vector being network-based, no privileges required, no user interaction needed, and full impact on confidentiality, integrity, and availability. Exploiting this flaw allows an attacker to fully compromise user accounts, potentially including administrative accounts, leading to unauthorized access, data theft, content manipulation, or complete site takeover. Although no known exploits in the wild have been reported yet, the ease of exploitation and the critical impact make this a high-risk vulnerability for WordPress sites using the affected themes and plugin versions. The vulnerability was published on November 14, 2022, and is tracked by WPScan and CISA. No official patch links were provided in the data, but upgrading to tagDiv Composer 3.5 or later and the corresponding theme versions is essential to remediate this issue.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites built with the Newspaper or Newsmag themes, which are widely used for news, media, and content publishing. Successful exploitation can lead to unauthorized access to sensitive user data, defacement of websites, injection of malicious content, or use of compromised sites as a platform for further attacks such as phishing or malware distribution. This can result in reputational damage, loss of customer trust, regulatory non-compliance (e.g., GDPR violations due to data breaches), and financial losses. Given the critical nature of the vulnerability and the fact that it requires only an email address to exploit, attackers can target high-profile European media outlets or corporate blogs to disrupt operations or steal confidential information. The impact extends beyond just the compromised website, as attackers could leverage access to pivot into internal networks if the WordPress instance is integrated with other enterprise systems.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately verify if they are using affected versions of the tagDiv Composer plugin and the Newspaper or Newsmag themes. The primary mitigation is to upgrade tagDiv Composer to version 3.5 or later, and update the Newspaper theme to version 12.1 or later, and Newsmag theme to version 5.2.2 or later, where the authentication flaw has been fixed. If immediate upgrades are not feasible, temporarily disabling the Facebook login feature within the plugin settings can reduce exposure. Additionally, organizations should implement monitoring for unusual login activities, especially logins without corresponding password authentication. Enforcing multi-factor authentication (MFA) on WordPress accounts, where possible, adds an additional layer of defense. Regularly auditing user accounts and removing inactive or suspicious accounts can limit potential damage. Web application firewalls (WAFs) with custom rules to detect and block suspicious login attempts based on email enumeration patterns may also help. Finally, maintaining regular backups of website data ensures recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-10-12T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed822

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 7/2/2025, 3:26:31 AM

Last updated: 2/7/2026, 6:33:15 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats