CVE-2025-6215
📋 TL;DR
The Omnishop WordPress plugin has an unauthenticated registration bypass vulnerability that allows attackers to create arbitrary customer accounts even when user registration is disabled. This affects all WordPress sites using Omnishop plugin versions up to 1.0.9. Attackers can exploit this without any authentication or special privileges.
💻 Affected Systems
- Omnishop WordPress Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers create numerous fake accounts to overwhelm the system, use accounts for spam campaigns, or establish footholds for further attacks like privilege escalation or data exfiltration.
Likely Case
Attackers create multiple customer accounts to abuse site functionality, post spam content, or conduct reconnaissance for future attacks.
If Mitigated
With proper monitoring and rate limiting, impact is limited to some unauthorized account creation that can be detected and cleaned up.
🎯 Exploit Status
Simple HTTP POST request to /users/register endpoint with user credentials. No authentication or special tools required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.1.0 or later
Vendor Advisory: https://wordpress.org/plugins/omnishop/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Omnishop plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin until patched version is released.
🔧 Temporary Workarounds
Block vulnerable endpoint via .htaccess
linuxBlock access to the vulnerable /users/register endpoint using Apache mod_rewrite
RewriteEngine On
RewriteRule ^wp-content/plugins/omnishop/users/register - [F,L]
Deactivate Omnishop plugin
allTemporarily disable the vulnerable plugin until patched version is available
wp plugin deactivate omnishop
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block requests to /users/register endpoint
- Enable detailed logging for user registration events and monitor for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check if Omnishop plugin is installed and version is 1.0.9 or earlier in WordPress admin panel or via wp plugin list command
Check Version:
wp plugin get omnishop --field=version
Verify Fix Applied:
Verify plugin version is 1.1.0 or later, or test that POST requests to /wp-content/plugins/omnishop/users/register no longer create users
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to /users/register endpoint from same IP
- Unexpected user account creations with 'customer' role
- Failed registration attempts when site registration is disabled
Network Indicators:
- HTTP POST requests to /wp-content/plugins/omnishop/users/register
- Unusual traffic patterns to registration endpoints
SIEM Query:
source="web_logs" AND uri_path="/wp-content/plugins/omnishop/users/register" AND http_method="POST"