CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2DescriptionNVD
The Webinar Solution: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition plugin for WordPress is vulnerable to unauthenticated login token generation due to a missing capability check on the webinarignition_sign_in_support_staff and webinarignition_register_support functions in all versions up to, and including, 4.03.32. This makes it possible for unauthenticated attackers to generate login tokens for arbitrary WordPress users under certain circumstances, issuing authorization cookies which can lead to authentication bypass.
AnalysisAI
Unauthenticated login token generation in WebinarIgnition plugin for WordPress (versions ≤4.03.32) allows remote attackers to bypass authentication and impersonate arbitrary users. The vulnerability stems from missing capability checks on support staff authentication functions, enabling attackers to generate valid login tokens and authorization cookies without credentials (CVSS:3.1 AV:N/AC:L/PR:N). EPSS data not provided; no confirmation of active exploitation (CISA KEV) at time of analysis. Public exploit code existence not confirmed, though technical details are available via WordPress plugin repository references.
Technical ContextAI
This vulnerability affects the WebinarIgnition WordPress plugin, a webinar management solution supporting live, evergreen, automated, and instant webinar formats with Zoom integration. The root cause is CWE-862 (Missing Authorization), specifically in two AJAX-accessible functions: webinarignition_sign_in_support_staff and webinarignition_register_support. These functions lack proper capability checks, allowing unauthenticated users to invoke privileged operations that generate WordPress authentication tokens. The vulnerable code resides in class-webinarignition.php (line 549), class.WebinarignitionAjax.php (line 769), and class.WebinarignitionManager.php (lines 53 and 1040). WordPress plugins using AJAX endpoints without nonce validation or capability verification are particularly susceptible to this authorization bypass pattern, as the WordPress REST API and admin-ajax.php handlers rely on developers to implement access controls explicitly.
Affected ProductsAI
WebinarIgnition plugin (full name: Webinar Solution: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings) for WordPress versions 4.03.32 and earlier are affected. The vulnerability impacts all historical versions up to and including 4.03.32. Affected installations are those with the plugin actively installed regardless of webinar configuration. WordPress sites with this plugin installed and accessible via the standard WordPress AJAX handler (admin-ajax.php) are exploitable. Vendor advisory and technical details available at Wordfence Threat Intelligence (https://www.wordfence.com/threat-intel/vulnerabilities/id/52c19707-df18-4239-af46-12ea5ee86a4b) and WordPress plugin repository changesets (https://plugins.trac.wordpress.org/changeset/3333177/).
RemediationAI
Immediately update WebinarIgnition plugin to version 4.03.33 or later, which addresses the missing capability checks per WordPress plugin changeset 3333177 committed on January 2025. Access WordPress admin dashboard, navigate to Plugins > Installed Plugins, locate WebinarIgnition, and apply available updates. If automatic updates are disabled, manually download the patched version from the official WordPress plugin repository. For sites unable to patch immediately, temporary risk reduction measures include disabling the WebinarIgnition plugin entirely until update deployment, implementing web application firewall (WAF) rules to block unauthenticated POST requests to admin-ajax.php with action parameters matching webinarignition_sign_in_support_staff or webinarignition_register_support, or restricting wp-admin and admin-ajax.php access to trusted IP addresses via server configuration. Review WordPress user accounts and access logs for unauthorized logins or privilege escalations occurring prior to patch application. Detailed technical changes available in plugin repository diff at https://plugins.trac.wordpress.org/changeset?old=3333045%40webinar-ignition&new=3333045%40webinar-ignition showing specific code modifications addressing the authorization flaw.
Share
External POC / Exploit Code
Leaving vuln.today