CVE-2019-10270

An arbitrary password reset issue was discovered in the Ultimate Member plugin 2.39 for WordPress. It is possible (due to lack of verification and correlation between the reset password key sent by mail and the user_id parameter) to reset the password of another user. One only needs to know the user_id, which is publicly available. One just has to intercept the password modification request and modify user_id. It is possible to modify the passwords for any users or admin WordPress Ultimate Members. This could lead to account compromise and privilege escalation.
References
Link Resource
https://cxsecurity.com/issue/WLB-2019060101 Exploit Third Party Advisory
https://cxsecurity.com/issue/WLB-2019060101 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 04:18

Type Values Removed Values Added
References () https://cxsecurity.com/issue/WLB-2019060101 - Exploit, Third Party Advisory () https://cxsecurity.com/issue/WLB-2019060101 - Exploit, Third Party Advisory

Information

Published : 2019-06-21 18:15

Updated : 2024-11-21 04:18


NVD link : CVE-2019-10270

Mitre link : CVE-2019-10270

CVE.ORG link : CVE-2019-10270


JSON object : View

Products Affected

ultimatemember

  • ultimate_member
CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password