CVE-2020-36156

An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Authenticated Privilege Escalation via Profile Update. Any user with wp-admin access to the profile.php page could supply the parameter um-role with a value set to any role (e.g., Administrator) during a profile update, and effectively escalate their privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:28

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 8.8
v2 : 6.5
v3 : 9.9
References () https://wordpress.org/plugins/ultimate-member/#developers - Release Notes, Third Party Advisory () https://wordpress.org/plugins/ultimate-member/#developers - Release Notes, Third Party Advisory
References () https://wpscan.com/vulnerability/dd4c4ece-7206-4788-8747-f0c0f3ab0a53 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/dd4c4ece-7206-4788-8747-f0c0f3ab0a53 - Exploit, Third Party Advisory
References () https://www.wordfence.com/blog/2020/11/critical-privilege-escalation-vulnerabilities-affect-100k-sites-using-ultimate-member-plugin/ - Exploit, Third Party Advisory () https://www.wordfence.com/blog/2020/11/critical-privilege-escalation-vulnerabilities-affect-100k-sites-using-ultimate-member-plugin/ - Exploit, Third Party Advisory

Information

Published : 2021-01-04 18:15

Updated : 2024-11-21 05:28


NVD link : CVE-2020-36156

Mitre link : CVE-2020-36156

CVE.ORG link : CVE-2020-36156


JSON object : View

Products Affected

ultimatemember

  • ultimate_member
CWE
CWE-269

Improper Privilege Management