[wp-trac] [WordPress Trac] #45334: User with admin capabilities created via POST?

WordPress Trac noreply at wordpress.org
Mon Nov 12 23:49:48 UTC 2018


#45334: User with admin capabilities created via POST?
---------------------------------+----------------------
 Reporter:  miloszryckobozenski  |       Owner:  (none)
     Type:  defect (bug)         |      Status:  closed
 Priority:  normal               |   Milestone:
Component:  General              |     Version:  4.9.8
 Severity:  normal               |  Resolution:  invalid
 Keywords:                       |     Focuses:
---------------------------------+----------------------
Changes (by dd32):

 * status:  new => closed
 * resolution:   => invalid
 * severity:  critical => normal
 * milestone:  Awaiting Review =>


Comment:

 Hi @miloszryckobozenski,

 > I got e-mail with notification that user with admin caps was created.

 Unfortunately you'll probably find that two settings have been altered on
 your install, on the Settings -> General page, ensure that
  - "Members can register" is disabled (Unless you specifically want to
 have users register)
  - "New User Default Role" is set to something sane (By default,
 'Subscriber', and not 'Administrator' as I believe it was when the user
 was registered)

 Although all your plugins are up to date, it's likely been caused by a
 recent plugin vulnerability which allowed those settings to be changed at
 a previous date (before the plugin update) and it's just now being
 exploited by a user registration being made.

 I'd recommend checking your other registered users as well and treat the
 site as hacked, check for other plugins, check for malicious code added to
 themes.

 Trac isn't a support avenue however, The [https://wordpress.org/support/
 Support Forums] may be able to further assist, plus the WordPress Codex
 has a page on what to do next:
 https://codex.wordpress.org/FAQ_My_site_was_hacked

 > [!] Full Path Disclosure (FPD)

 WordPress doesn't consider FPD to be a valid concern for the software, and
 recommends disabling the `display_errors` PHP directive in production.
 While I'll agree that it could be an "easy fix" it's not something that
 we're currently interested in.

 https://make.wordpress.org/core/handbook/testing/reporting-security-
 vulnerabilities/#why-are-there-path-disclosures-when-directly-loading-
 certain-files


 I'm marking this as invalid, as unfortunately there's nothing included
 which is a bug in WordPress, just the unfortunate side effects from a bad
 plugin allowing a bad actor to alter settings and create users.

-- 
Ticket URL: <https://core.trac.wordpress.org/ticket/45334#comment:1>
WordPress Trac <https://core.trac.wordpress.org/>
WordPress publishing platform


More information about the wp-trac mailing list