A CSRF vulnerability in a logged-in user's profile edit form in the Ultimate Member plugin before 2.0.40 for WordPress allows attackers to become admin and subsequently extract sensitive information and execute arbitrary code. This occurs because the attacker can change the e-mail address in the administrator profile, and then the attacker is able to reset the administrator password using the WordPress "password forget" form.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/152315/WordPress-Ultimate-Member-2.0.38-Cross-Site-Request-Forgery.html | Exploit Third Party Advisory VDB Entry |
https://wpvulndb.com/vulnerabilities/9250 | |
http://packetstormsecurity.com/files/152315/WordPress-Ultimate-Member-2.0.38-Cross-Site-Request-Forgery.html | Exploit Third Party Advisory VDB Entry |
https://wpvulndb.com/vulnerabilities/9250 |
Configurations
History
21 Nov 2024, 04:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/152315/WordPress-Ultimate-Member-2.0.38-Cross-Site-Request-Forgery.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://wpvulndb.com/vulnerabilities/9250 - |
Information
Published : 2019-04-03 05:29
Updated : 2024-11-21 04:19
NVD link : CVE-2019-10673
Mitre link : CVE-2019-10673
CVE.ORG link : CVE-2019-10673
JSON object : View
Products Affected
ultimatemember
- ultimate_member
CWE
CWE-352
Cross-Site Request Forgery (CSRF)