CVE-2021-47932
Received Received - Intake
Unauthenticated Privilege Escalation in TheCartPress

Publication date: 2026-05-10

Last updated on: 2026-05-10

Assigner: VulnCheck

Description
WordPress TheCartPress 1.5.3.6 contains an unauthenticated privilege escalation vulnerability that allows attackers to create administrator accounts by submitting crafted requests to the AJAX handler. Attackers can send POST requests to the tcp_register_and_login_ajax action with tcp_role set to administrator to gain full administrative access without authentication.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-10
Last Modified
2026-05-10
Generated
2026-05-10
AI Q&A
2026-05-10
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
inigo_gonzalez thecartpress to 1.5.3.6 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to create administrator accounts and gain full administrative access to WordPress sites using TheCartPress plugin. This unauthorized access can lead to data breaches, unauthorized data modification, and loss of control over sensitive information.

Such unauthorized access and potential data compromise can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict controls over access to personal and sensitive data, as well as measures to prevent unauthorized access and ensure data integrity.

Therefore, exploitation of this vulnerability could result in violations of these regulations due to failure to protect data confidentiality, integrity, and access controls.


Can you explain this vulnerability to me?

The vulnerability exists in WordPress plugin TheCartPress version 1.5.3.6 and allows unauthenticated attackers to escalate their privileges.

Attackers can send specially crafted POST requests to the AJAX handler endpoint with the action parameter set to 'tcp_register_and_login_ajax' and the tcp_role parameter set to 'administrator'.

This enables them to create new administrator accounts without any authentication, thereby gaining full administrative access to the WordPress site.


How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows attackers to gain full administrative control over a WordPress site running TheCartPress 1.5.3.6 without any authentication.

  • Attackers can create administrator accounts and perform any action an admin user can, including modifying content, installing malicious plugins, or stealing sensitive data.
  • The complete compromise of the website's integrity, confidentiality, and availability is possible.
  • Such control can lead to defacement, data breaches, or use of the site as a platform for further attacks.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for crafted POST requests sent to the WordPress AJAX handler endpoint '/wp-admin/admin-ajax.php' with the action parameter set to 'tcp_register_and_login_ajax' and the tcp_role parameter set to 'administrator'. Such requests indicate attempts to create administrator accounts without authentication.

A network or system administrator can use command-line tools like curl or network monitoring tools to detect these requests. For example, a curl command to test the vulnerability might look like this:

  • curl -X POST https://yourwordpresssite.com/wp-admin/admin-ajax.php -d "action=tcp_register_and_login_ajax&tcp_role=administrator&other_required_parameters"

Additionally, network intrusion detection systems (NIDS) or web application firewalls (WAF) can be configured to alert on POST requests containing 'action=tcp_register_and_login_ajax' and 'tcp_role=administrator'.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling or removing the vulnerable TheCartPress plugin version 1.5.3.6 from your WordPress installation, as the plugin is no longer maintained and contains a critical unauthenticated privilege escalation vulnerability.

If removal is not immediately possible, restrict access to the '/wp-admin/admin-ajax.php' endpoint or implement web application firewall rules to block POST requests with the parameters 'action=tcp_register_and_login_ajax' and 'tcp_role=administrator'.

Also, monitor your WordPress user accounts for any unauthorized administrator accounts and remove them promptly.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart