CVE-2022-33970

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated WordPress users to modify WordPress options, potentially leading to privilege escalation or site takeover. It affects WordPress sites running the Biplob018 Shortcode Addons plugin version 3.1.2 or earlier.

💻 Affected Systems

Products:
  • Biplob018 Shortcode Addons WordPress plugin
Versions: <= 3.1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable plugin version and at least one authenticated user account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with authenticated access could modify critical WordPress settings, install malicious plugins/themes, or gain administrative control of the entire WordPress site.

🟠

Likely Case

Authenticated users (including subscribers) could modify site settings, inject malicious content, or disrupt site functionality.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized setting changes that can be detected and reverted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to WordPress. Public proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.3 or later

Vendor Advisory: https://wordpress.org/plugins/shortcode-addons/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Shortcode Addons' and click 'Update Now'. 4. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Shortcode Addons plugin until patched

wp plugin deactivate shortcode-addons

Restrict user capabilities

all

Limit authenticated users' capabilities to prevent options modification

Use WordPress role editor plugins to restrict 'edit_options' capability

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized option changes
  • Use web application firewall rules to block suspicious option modification requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Shortcode Addons version 3.1.2 or earlier

Check Version:

wp plugin get shortcode-addons --field=version

Verify Fix Applied:

Verify plugin version is 3.1.3 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • WordPress option update logs from non-admin users
  • Unexpected wp_options table modifications

Network Indicators:

  • POST requests to wp-admin/admin-ajax.php with option modification parameters

SIEM Query:

source="wordpress" AND (action="update_option" OR uri_path="/wp-admin/admin-ajax.php") AND user_role!="administrator"

🔗 References

📤 Share & Export