Pinterest Automatic - Authentication Bypass (CVE-2021-4380)
1Exploiting IPs reported
The Pinterest Automatic plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the 'wp_pinterest_automatic_parse_request' function and the 'process_form.php' script in versions up to, and including, 1.14.3. This makes it possible for unauthenticated attackers to update arbitrary options on a site that can be used to create new administrative user accounts or redirect unsuspecting site visitors.
CrowdSec analysis
CVE-2021-4380 is a critical authorization bypass vulnerability in the Pinterest Automatic plugin for WordPress, affecting versions up to 1.14.3. This flaw allows unauthenticated attackers to update arbitrary site options, potentially leading to the creation of new administrative accounts or malicious redirection of site visitors. Exploitation of this vulnerability could result in full site compromise and significant security risks for affected WordPress installations.
CrowdSec has been tracking this vulnerability and its exploits since 15th of October 2025.
Based on data from the CrowdSec network, nearly all observed exploitation of CVE-2021-4380 is fully opportunistic, with attackers indiscriminately scanning the entire internet. These attacks are automated and lack any form of target selection or reconnaissance. Data from the CrowdSec community also indicates a gradual decrease in attacks targeting CVE-2021-4380. While still present in the wild, exploitation levels have dropped noticeably week-over-week. This may signal that the vulnerability is becoming less relevant or that defenses are improving fast enough for attackers to lose interest.
Attackers exploit the endpoint /?wp_pinterest_automatic=settings to perform unauthorized POST requests, allowing them to update arbitrary WordPress site options without authentication.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.