CVE-2021-4343

9.8 CRITICAL

📋 TL;DR

This vulnerability in the Unauthenticated Account Creation plugin for WordPress allows unauthenticated attackers to create user accounts, including administrator accounts, without any authentication. It affects WordPress sites using the plugin up to version 1.6.6. Attackers can gain administrative access to vulnerable WordPress installations.

💻 Affected Systems

Products:
  • WordPress Unauthenticated Account Creation plugin (also known as uListing plugin)
Versions: Versions up to and including 1.6.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin active. The plugin must be installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers create administrator accounts, take full control of the WordPress site, install malware, steal data, deface the site, or use it as a foothold for further attacks.

🟠

Likely Case

Attackers create administrator accounts and compromise the WordPress site for malicious purposes like SEO spam, phishing, or cryptocurrency mining.

🟢

If Mitigated

With proper controls like network segmentation and monitoring, impact is limited to the affected WordPress instance, but administrative compromise still occurs.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, making them directly accessible to attackers worldwide.
🏢 Internal Only: LOW - This vulnerability requires access to the WordPress admin interface, which is typically not exposed internally without internet access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is simple - attackers can send crafted HTTP requests to the vulnerable AJAX endpoint without authentication. Public proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.6.7 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2456786%40ulisting&new=2456786%40ulisting

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Unauthenticated Account Creation' or 'uListing' plugin. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download version 1.6.7+ from WordPress.org and replace the plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate ulisting

Block AJAX endpoint

linux

Block access to the vulnerable AJAX endpoint via web server configuration

# For Apache: add to .htaccess
<Files "admin-ajax.php">
    Order Allow,Deny
    Deny from all
</Files>
# For Nginx: add to server block
location ~* /wp-admin/admin-ajax.php {
    deny all;
}

🧯 If You Can't Patch

  • Remove the plugin completely if not essential for site functionality
  • Implement web application firewall (WAF) rules to block requests to the stm_listing_register AJAX action

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Unauthenticated Account Creation' or 'uListing' plugin version 1.6.6 or earlier

Check Version:

wp plugin list --name=ulisting --field=version

Verify Fix Applied:

Verify plugin version is 1.6.7 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=stm_listing_register
  • Multiple user account creation events from single IP addresses
  • Administrator account creation from unfamiliar IP addresses

Network Indicators:

  • HTTP POST requests to WordPress AJAX endpoints with user registration parameters from unauthenticated sources

SIEM Query:

source="web_logs" AND uri_path="/wp-admin/admin-ajax.php" AND post_data="action=stm_listing_register"

🔗 References

📤 Share & Export