Miggo Logo

CVE-2021-29504: Improper Certificate Validation in WP-CLI framework

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.73901%
Published
5/19/2021
Updated
2/7/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
wp-cli/wp-clicomposer>= 0.12.0, < 2.5.02.5.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability directly stems from WP_CLI\Utils\http_request's original error handling behavior. The patch modifies this function to add an $insecure parameter (default false) and remove automatic insecure retries. This function is the core HTTPS request handler used by multiple commands, making it the primary vulnerable entry point. The function signature change in PR#5523 explicitly shows where the vulnerable logic was located and modified.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *n improp*r *rror **n*lin* in *TTPS r*qu*sts m*n***m*nt in WP-*LI v*rsion *.**.* *n* l*t*r *llows r*mot* *tt**k*rs **l* to int*r**pt t** *ommuni**tion to r*mot*ly *is**l* t** **rti*i**t* v*ri*i**tion on WP-*LI si**, **inin* *ull *ontrol ov

Reasoning

T** vuln*r**ility *ir**tly st*ms *rom WP_*LI\Utils\*ttp_r*qu*st's ori*in*l *rror **n*lin* ****vior. T** p*t** mo*i*i*s t*is *un*tion to *** *n $ins**ur* p*r*m*t*r (****ult **ls*) *n* r*mov* *utom*ti* ins**ur* r*tri*s. T*is *un*tion is t** *or* *TTPS