CVE-2021-47932
Unauthenticated Privilege Escalation in TheCartPress
Publication date: 2026-05-10
Last updated on: 2026-05-10
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| inigo_gonzalez | thecartpress | to 1.5.3.6 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to create administrator accounts and gain full administrative access to WordPress sites using TheCartPress plugin. This unauthorized access can lead to data breaches, unauthorized data modification, and loss of control over sensitive information.
Such unauthorized access and potential data compromise can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict controls over access to personal and sensitive data, as well as measures to prevent unauthorized access and ensure data integrity.
Therefore, exploitation of this vulnerability could result in violations of these regulations due to failure to protect data confidentiality, integrity, and access controls.
Can you explain this vulnerability to me?
The vulnerability exists in WordPress plugin TheCartPress version 1.5.3.6 and allows unauthenticated attackers to escalate their privileges.
Attackers can send specially crafted POST requests to the AJAX handler endpoint with the action parameter set to 'tcp_register_and_login_ajax' and the tcp_role parameter set to 'administrator'.
This enables them to create new administrator accounts without any authentication, thereby gaining full administrative access to the WordPress site.
How can this vulnerability impact me? :
This vulnerability can have severe impacts as it allows attackers to gain full administrative control over a WordPress site running TheCartPress 1.5.3.6 without any authentication.
- Attackers can create administrator accounts and perform any action an admin user can, including modifying content, installing malicious plugins, or stealing sensitive data.
- The complete compromise of the website's integrity, confidentiality, and availability is possible.
- Such control can lead to defacement, data breaches, or use of the site as a platform for further attacks.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for crafted POST requests sent to the WordPress AJAX handler endpoint '/wp-admin/admin-ajax.php' with the action parameter set to 'tcp_register_and_login_ajax' and the tcp_role parameter set to 'administrator'. Such requests indicate attempts to create administrator accounts without authentication.
A network or system administrator can use command-line tools like curl or network monitoring tools to detect these requests. For example, a curl command to test the vulnerability might look like this:
- curl -X POST https://yourwordpresssite.com/wp-admin/admin-ajax.php -d "action=tcp_register_and_login_ajax&tcp_role=administrator&other_required_parameters"
Additionally, network intrusion detection systems (NIDS) or web application firewalls (WAF) can be configured to alert on POST requests containing 'action=tcp_register_and_login_ajax' and 'tcp_role=administrator'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disabling or removing the vulnerable TheCartPress plugin version 1.5.3.6 from your WordPress installation, as the plugin is no longer maintained and contains a critical unauthenticated privilege escalation vulnerability.
If removal is not immediately possible, restrict access to the '/wp-admin/admin-ajax.php' endpoint or implement web application firewall rules to block POST requests with the parameters 'action=tcp_register_and_login_ajax' and 'tcp_role=administrator'.
Also, monitor your WordPress user accounts for any unauthorized administrator accounts and remove them promptly.