CVE-2022-3880: CWE-863 Incorrect Authorization in Unknown Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan
The Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan WordPress plugin before 4.20 does not have proper authorisation and CSRF in an AJAX action, allowing any authenticated users, such as subscriber to call it and install and activate arbitrary plugins from wordpress.org
AI Analysis
Technical Summary
CVE-2022-3880 is a medium-severity vulnerability affecting the WordPress plugin named 'Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan' in versions prior to 4.20. The core issue is an incorrect authorization (CWE-863) combined with a Cross-Site Request Forgery (CSRF) vulnerability (CWE-352) in an AJAX action within the plugin. This flaw allows any authenticated user, including low-privileged roles such as subscribers, to exploit the AJAX endpoint to install and activate arbitrary plugins from the official WordPress.org repository without proper permission checks. The vulnerability arises because the plugin fails to verify that the requesting user has sufficient privileges to perform plugin installation and activation, and it also lacks CSRF protections to prevent unauthorized cross-site requests. The CVSS 3.1 base score is 6.5 (medium), with an attack vector of network (remote), low attack complexity, no privileges required (PR:N), but user interaction is required (UI:R). The impact is primarily on integrity, as an attacker can introduce malicious plugins that could execute arbitrary code or escalate privileges. Availability and confidentiality impacts are not directly indicated. There are no known exploits in the wild, and no patches are linked in the provided data, suggesting that mitigation may rely on plugin updates or manual intervention. The vulnerability was reserved in November 2022 and published in December 2022, with WPScan as the assigner and CISA enrichment indicating recognized importance.
Potential Impact
For European organizations using WordPress websites with this vulnerable plugin, the risk is significant because an attacker with any authenticated user account—potentially even a subscriber account—can install and activate arbitrary plugins. This can lead to full site compromise, data integrity breaches, and potential lateral movement within the hosting environment. Given WordPress's widespread use in Europe for corporate, governmental, and e-commerce sites, exploitation could result in defacement, data theft, or the deployment of malware such as ransomware. The integrity of the website and its data is at risk, which could undermine trust and cause reputational damage. Since the vulnerability requires user interaction (an authenticated user), organizations with weak user account management or where subscriber accounts are easily obtained or compromised are at higher risk. The lack of confidentiality and availability impact reduces the risk of direct data leakage or denial of service, but the ability to install arbitrary plugins can indirectly lead to these outcomes if attackers deploy further payloads. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk, especially as automated scanning tools may identify vulnerable sites.
Mitigation Recommendations
1. Immediate update of the plugin to version 4.20 or later where the vulnerability is fixed. If an update is not available, consider disabling or removing the plugin until patched. 2. Restrict user roles and permissions rigorously; ensure that only trusted users have authenticated access to the WordPress backend, and minimize the number of subscriber or low-privilege accounts. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests attempting to install or activate plugins via this plugin's endpoints. 4. Monitor WordPress logs for unusual plugin installation or activation activities, especially those initiated by low-privileged users. 5. Employ multi-factor authentication (MFA) for all authenticated users to reduce the risk of account compromise. 6. Regularly audit installed plugins and their versions across WordPress instances to identify vulnerable versions. 7. Harden WordPress installations by disabling plugin installation and activation for non-administrator roles using custom code or security plugins. 8. Educate administrators and users about the risks of granting unnecessary permissions and the importance of applying updates promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2022-3880: CWE-863 Incorrect Authorization in Unknown Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan
Description
The Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan WordPress plugin before 4.20 does not have proper authorisation and CSRF in an AJAX action, allowing any authenticated users, such as subscriber to call it and install and activate arbitrary plugins from wordpress.org
AI-Powered Analysis
Technical Analysis
CVE-2022-3880 is a medium-severity vulnerability affecting the WordPress plugin named 'Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan' in versions prior to 4.20. The core issue is an incorrect authorization (CWE-863) combined with a Cross-Site Request Forgery (CSRF) vulnerability (CWE-352) in an AJAX action within the plugin. This flaw allows any authenticated user, including low-privileged roles such as subscribers, to exploit the AJAX endpoint to install and activate arbitrary plugins from the official WordPress.org repository without proper permission checks. The vulnerability arises because the plugin fails to verify that the requesting user has sufficient privileges to perform plugin installation and activation, and it also lacks CSRF protections to prevent unauthorized cross-site requests. The CVSS 3.1 base score is 6.5 (medium), with an attack vector of network (remote), low attack complexity, no privileges required (PR:N), but user interaction is required (UI:R). The impact is primarily on integrity, as an attacker can introduce malicious plugins that could execute arbitrary code or escalate privileges. Availability and confidentiality impacts are not directly indicated. There are no known exploits in the wild, and no patches are linked in the provided data, suggesting that mitigation may rely on plugin updates or manual intervention. The vulnerability was reserved in November 2022 and published in December 2022, with WPScan as the assigner and CISA enrichment indicating recognized importance.
Potential Impact
For European organizations using WordPress websites with this vulnerable plugin, the risk is significant because an attacker with any authenticated user account—potentially even a subscriber account—can install and activate arbitrary plugins. This can lead to full site compromise, data integrity breaches, and potential lateral movement within the hosting environment. Given WordPress's widespread use in Europe for corporate, governmental, and e-commerce sites, exploitation could result in defacement, data theft, or the deployment of malware such as ransomware. The integrity of the website and its data is at risk, which could undermine trust and cause reputational damage. Since the vulnerability requires user interaction (an authenticated user), organizations with weak user account management or where subscriber accounts are easily obtained or compromised are at higher risk. The lack of confidentiality and availability impact reduces the risk of direct data leakage or denial of service, but the ability to install arbitrary plugins can indirectly lead to these outcomes if attackers deploy further payloads. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk, especially as automated scanning tools may identify vulnerable sites.
Mitigation Recommendations
1. Immediate update of the plugin to version 4.20 or later where the vulnerability is fixed. If an update is not available, consider disabling or removing the plugin until patched. 2. Restrict user roles and permissions rigorously; ensure that only trusted users have authenticated access to the WordPress backend, and minimize the number of subscriber or low-privilege accounts. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests attempting to install or activate plugins via this plugin's endpoints. 4. Monitor WordPress logs for unusual plugin installation or activation activities, especially those initiated by low-privileged users. 5. Employ multi-factor authentication (MFA) for all authenticated users to reduce the risk of account compromise. 6. Regularly audit installed plugins and their versions across WordPress instances to identify vulnerable versions. 7. Harden WordPress installations by disabling plugin installation and activation for non-administrator roles using custom code or security plugins. 8. Educate administrators and users about the risks of granting unnecessary permissions and the importance of applying updates promptly.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-11-07T16:28:07.354Z
- Cisa Enriched
- true
Threat ID: 682d9848c4522896dcbf5eaf
Added to database: 5/21/2025, 9:09:28 AM
Last enriched: 6/22/2025, 5:50:42 AM
Last updated: 8/12/2025, 2:48:53 AM
Views: 10
Related Threats
CVE-2025-9039: CWE-277: Insecure Inherited Permissions, CWE-648: Incorrect Use of Privileged APIs in Amazon ECS
MediumCVE-2025-8967: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-54867: CWE-61: UNIX Symbolic Link (Symlink) Following in youki-dev youki
HighCVE-2025-8966: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8965: Unrestricted Upload in linlinjava litemall
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.