### [CVE-2021-38314](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314) ![](https://img.shields.io/static/v1?label=Product&message=Gutenberg%20Template%20Library%20%26%20Redux%20Framework&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=4.2.11%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Exposure&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-760%20Use%20of%20a%20One-Way%20Hash%20with%20a%20Predictable%20Salt&color=brightgreen) ### Description The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/0xGabe/CVE-2021-38314 - https://github.com/20142995/Goby - https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ArrestX/--POC - https://github.com/HimmelAward/Goby_POC - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Miraitowa70/POC-Notes - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/NyxAzrael/Goby_POC - https://github.com/SYRTI/POC_to_review - https://github.com/Threekiii/Awesome-POC - https://github.com/WhooAmii/POC_to_review - https://github.com/XiaomingX/awesome-poc-for-red-team - https://github.com/Z0fhack/Goby_POC - https://github.com/akhilkoradiya/CVE-2021-38314 - https://github.com/anquanscan/sec-tools - https://github.com/byteofjoshua/CVE-2021-38314 - https://github.com/c0ff33b34n/CVE-2021-38314 - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/orangmuda/CVE-2021-38314 - https://github.com/pankajkryadav/Hacktivity - https://github.com/phrantom/cve-2021-38314 - https://github.com/shubhayu-64/CVE-2021-38314 - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit - https://github.com/twseptian/cve-2021-38314 - https://github.com/zecool/cve