An issue was discovered in the acf-to-rest-api plugin through 3.1.0 for WordPress. It allows an insecure direct object reference via permalinks manipulation, as demonstrated by a wp-json/acf/v3/options/ request that reads sensitive information in the wp_options table, such as the login and pass values.
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Link | Tags |
---|---|
https://github.com/airesvsg/acf-to-rest-api | third party advisory |
https://wordpress.org/plugins/acf-to-rest-api/#developers | third party advisory release notes |
https://gist.github.com/mariuszpoplwski/4fbaab7f271bea99c733e3f2a4bafbb5 | third party advisory exploit |