Usually, all the web applications hosted on a server require authentication to gain access to the private information and to execute tasks. The older versions of WordPress are prone to authentication bypass vulnerability. Under this attack, an attacker can exploit the authentication bypass vulnerability to gain unauthorised access to the server, so that he can bypass the implemented security restrictions. The attacker exploits this vulnerability by changing the requests. This change tricks the application into thinking that the attacker is already authenticated. There are plugins like Userpro that are vulnerable to maliciously crafted HTTP request. Due to this vulnerability, the plugin might cause attacks like an authentication bypass. The attacker will use the vulnerability to gain administrator access to the web application.
The attacker can do the following impacts:-