Critical Thinking - Bug Bounty Podcast cover image

Critical Thinking - Bug Bounty Podcast

Episode 55: Popping WordPress Plugins - Methodology Braindump

Jan 25, 2024
The podcast explores advanced knowledge about hacking WordPress plugins, discusses vulnerabilities in Elementor plugin, delves into handling user input and lack of access control in WordPress plugins, explores WordPress REST APIs and their exploits, discusses low install count authentication plugins and page-related code in WordPress, explores vulnerabilities in WordPress update option, delves into WordPress plugin functionality and SSRF, explores blind SSRF and XSS vulnerabilities in plugins, discusses HTML tag cleaning and attribute escaping, explores bypassing security measures and vulnerabilities in plugins, discusses WordPress security and SQL injection challenges, explores various vulnerabilities in WordPress and their exploitation, and delves into credential stealing and remote code execution vulnerabilities.
01:44:04

Podcast summary created with Snipd AI

Quick takeaways

  • Understanding and exploiting vulnerabilities in WordPress plugins, including RCE, SSRF, and XSS.
  • Importance of thorough plugin security assessments and proper input/output validation in WordPress plugins.

Deep dives

Summary of Podcast Episode: The Vulnerabilities and Security of WordPress

This podcast episode explores the vulnerabilities and security of WordPress, focusing on specific areas of concern. The episode covers various sources of vulnerabilities, such as ad action hooks, WP Ajax, and register_rest_routes. These sources allow for the execution of callback functions and trigger code flows. The episode emphasizes the importance of understanding how to exploit these vulnerabilities, including CSRF attacks, leaking nonces, and creating short codes. Additionally, the episode highlights the significance of thorough testing and debugging with tools like Xdebug to gain a better understanding of the inner workings of WordPress. The discussion concludes by mentioning commonly exploited PHP functions, such as unlink, file_exists, file_get_contents, and require/include, which can lead to remote file inclusion (RFI) or local file inclusion (LFI) vulnerabilities.

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner