Skip to main content

CVE-2022-3489: CWE-862 Missing Authorization in Unknown Wp-Hide

Medium
VulnerabilityCVE-2022-3489cvecve-2022-3489cwe-862cwe-352
Published: Mon Nov 07 2022 (11/07/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Wp-Hide

Description

The WP Hide WordPress plugin through 0.0.2 does not have authorisation and CSRF checks in place when updating the custom_wpadmin_slug settings, allowing unauthenticated attackers to update it with a crafted request

AI-Powered Analysis

AILast updated: 06/25/2025, 23:01:11 UTC

Technical Analysis

CVE-2022-3489 is a medium-severity vulnerability affecting version 0.0.2 of the WP Hide WordPress plugin. This plugin is designed to obscure or change default WordPress paths to enhance security by hiding common WordPress endpoints. The vulnerability arises due to missing authorization and Cross-Site Request Forgery (CSRF) protections when updating the 'custom_wpadmin_slug' setting. Specifically, the plugin does not verify whether the request to change this critical setting is coming from an authenticated and authorized user, nor does it implement CSRF tokens to prevent unauthorized state-changing requests. As a result, an unauthenticated attacker can craft and send a malicious HTTP request to update the 'custom_wpadmin_slug' parameter. This setting controls the URL slug for the WordPress admin login page, and unauthorized modification can redirect legitimate users to attacker-controlled endpoints or disrupt administrative access. The vulnerability is exploitable remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to integrity, as the attacker can alter configuration settings but cannot directly compromise confidentiality or availability. No known exploits have been reported in the wild, and no official patches or updates have been linked, implying that mitigation relies on plugin updates or manual intervention. The vulnerability is categorized under CWE-862 (Missing Authorization) and CWE-352 (Cross-Site Request Forgery), highlighting the absence of proper access control and CSRF protections in the plugin's update mechanism.

Potential Impact

For European organizations using the WP Hide plugin version 0.0.2, this vulnerability poses a risk primarily to the integrity of their WordPress administrative interface. Unauthorized modification of the admin login slug can lead to administrative lockout, redirection to malicious pages, or facilitate further attacks such as phishing or credential harvesting. While the vulnerability does not directly expose sensitive data or cause denial of service, the alteration of admin paths can undermine security controls and complicate incident response. Organizations relying on WordPress for public-facing websites, e-commerce, or internal portals may experience reputational damage and operational disruption if attackers exploit this flaw to manipulate admin access. Given the ease of exploitation (no authentication or user interaction required), automated scanning and exploitation attempts could increase if the vulnerability becomes widely known. However, the absence of known exploits in the wild suggests limited current impact. The threat is more significant for organizations with limited patch management processes or those using outdated plugin versions without monitoring for security updates.

Mitigation Recommendations

1. Immediate upgrade: Organizations should verify the WP Hide plugin version and upgrade to a patched or newer version if available. If no official patch exists, consider disabling or uninstalling the plugin until a fix is released. 2. Access control: Restrict administrative access to WordPress dashboards via IP whitelisting or VPN to reduce exposure to unauthenticated requests. 3. Web application firewall (WAF): Deploy WAF rules to detect and block unauthorized attempts to modify the 'custom_wpadmin_slug' parameter or suspicious POST requests targeting the plugin endpoints. 4. Monitor logs: Enable detailed logging of HTTP requests to WordPress admin endpoints and monitor for unusual or unauthorized changes to configuration parameters. 5. Implement CSRF protections: If maintaining a custom or forked version of the plugin, ensure that all state-changing requests include proper authorization checks and CSRF tokens. 6. Incident response readiness: Prepare to restore admin access via database-level interventions if the admin slug is maliciously changed, including knowledge of how to reset or override the slug directly in the WordPress database. 7. User awareness: Educate administrators about the risks of using outdated plugins and the importance of timely updates and security hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-10-13T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec444

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/25/2025, 11:01:11 PM

Last updated: 8/11/2025, 12:29:20 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats