CVE-2025-6215

5.3 MEDIUM

📋 TL;DR

The Omnishop WordPress plugin has an unauthenticated registration bypass vulnerability that allows attackers to create arbitrary customer accounts even when user registration is disabled. This affects all WordPress sites using Omnishop plugin versions up to 1.0.9. Attackers can exploit this without any authentication or special privileges.

💻 Affected Systems

Products:
  • Omnishop WordPress Plugin
Versions: All versions up to and including 1.0.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists regardless of WordPress registration settings (users_can_register option).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers create numerous fake accounts to overwhelm the system, use accounts for spam campaigns, or establish footholds for further attacks like privilege escalation or data exfiltration.

🟠

Likely Case

Attackers create multiple customer accounts to abuse site functionality, post spam content, or conduct reconnaissance for future attacks.

🟢

If Mitigated

With proper monitoring and rate limiting, impact is limited to some unauthorized account creation that can be detected and cleaned up.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request to /users/register endpoint with user credentials. No authentication or special tools required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.0 or later

Vendor Advisory: https://wordpress.org/plugins/omnishop/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Omnishop plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin until patched version is released.

🔧 Temporary Workarounds

Block vulnerable endpoint via .htaccess

linux

Block access to the vulnerable /users/register endpoint using Apache mod_rewrite

RewriteEngine On
RewriteRule ^wp-content/plugins/omnishop/users/register - [F,L]

Deactivate Omnishop plugin

all

Temporarily disable the vulnerable plugin until patched version is available

wp plugin deactivate omnishop

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to /users/register endpoint
  • Enable detailed logging for user registration events and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check if Omnishop plugin is installed and version is 1.0.9 or earlier in WordPress admin panel or via wp plugin list command

Check Version:

wp plugin get omnishop --field=version

Verify Fix Applied:

Verify plugin version is 1.1.0 or later, or test that POST requests to /wp-content/plugins/omnishop/users/register no longer create users

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /users/register endpoint from same IP
  • Unexpected user account creations with 'customer' role
  • Failed registration attempts when site registration is disabled

Network Indicators:

  • HTTP POST requests to /wp-content/plugins/omnishop/users/register
  • Unusual traffic patterns to registration endpoints

SIEM Query:

source="web_logs" AND uri_path="/wp-content/plugins/omnishop/users/register" AND http_method="POST"

🔗 References

📤 Share & Export