CVE-2023-2437
📋 TL;DR
The UserPro WordPress plugin up to version 5.1.1 has an authentication bypass vulnerability in its Facebook login functionality. Unauthenticated attackers can log in as any existing user, including administrators, if they obtain the user's email address. This vulnerability is often chained with CVE-2023-2448 and CVE-2023-2446 to acquire email addresses for successful exploitation.
💻 Affected Systems
- WordPress UserPro plugin
📦 What is this software?
Userpro by Userproplugin
⚠️ Risk & Real-World Impact
Worst Case
Complete site takeover with administrative privileges, allowing data theft, defacement, malware injection, and full control over the WordPress installation.
Likely Case
Unauthorized access to user accounts, potential privilege escalation to administrator if admin email is obtained, and data compromise.
If Mitigated
Limited impact if proper email security and access controls prevent attackers from obtaining user email addresses.
🎯 Exploit Status
Exploit code is publicly available on Packet Storm Security. Successful exploitation requires obtaining target user email addresses, often through chaining with other vulnerabilities.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.1.2 or later
Vendor Advisory: https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find UserPro plugin and check for updates. 4. Update to version 5.1.2 or later. 5. Verify the update completed successfully.
🔧 Temporary Workarounds
Disable Facebook Login
allTemporarily disable the Facebook login functionality in UserPro plugin settings to prevent exploitation.
Disable UserPro Plugin
allDeactivate the UserPro plugin until patched to completely eliminate the vulnerability.
🧯 If You Can't Patch
- Implement strict access controls and monitor for unusual login activity, particularly via Facebook authentication.
- Use web application firewall (WAF) rules to block suspicious authentication attempts and monitor for exploitation patterns.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins → UserPro version. If version is 5.1.1 or lower, the system is vulnerable.
Check Version:
wp plugin list --name=userpro --field=version (if WP-CLI is installed)
Verify Fix Applied:
After updating, verify UserPro plugin version is 5.1.2 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual Facebook login attempts, multiple failed login attempts followed by successful login from new IP, administrator login from unexpected locations
Network Indicators:
- HTTP POST requests to /wp-content/plugins/userpro/facebook/ with authentication parameters, unusual traffic patterns to Facebook OAuth endpoints
SIEM Query:
source="wordpress.log" AND ("facebook/login" OR "userpro/facebook") AND status=200
🔗 References
- http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
- https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b3cf9f38-c20e-40dc-a7a1-65b0c6ba7925?source=cve
- http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
- https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b3cf9f38-c20e-40dc-a7a1-65b0c6ba7925?source=cve