The directory-pro WordPress plugin before 1.9.5, final-user-wp-frontend-user-profiles WordPress plugin before 1.2.2, producer-retailer WordPress plugin through TODO, photographer-directory WordPress plugin before 1.0.9, real-estate-pro WordPress plugin before 1.7.1, institutions-directory WordPress plugin before 1.3.1, lawyer-directory WordPress plugin before 1.2.9, doctor-listing WordPress plugin before 1.3.6, Hotel Listing WordPress plugin before 1.3.7, fitness-trainer WordPress plugin before 1.4.1, wp-membership WordPress plugin before 1.5.7, sold by the same developer (e-plugins), do not implementing any security measures in some AJAX calls. For example in the file plugin.php, the function iv_directories_update_profile_setting() uses update_user_meta with any data provided by the ajax call, which can be used to give the logged in user admin capabilities. Since the plugins allow user registration via a custom form (even if the blog does not allow users to register) it makes any site using it vulnerable.
References
Link | Resource |
---|---|
https://codecanyon.net/user/e-plugins | Product |
https://wpscan.com/vulnerability/d079cb16-ead5-4bc8-b0b8-4a4dc2a54c96 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-03-27 16:15
Updated : 2024-02-28 20:13
NVD link : CVE-2020-36666
Mitre link : CVE-2020-36666
CVE.ORG link : CVE-2020-36666
JSON object : View
Products Affected
e-plugins
- final_user
- producer-retailer
- real_estate_pro
- wp_membership
- institutions_directory
- fitness_trainer
- directory_pro
- hotel_directory
- lawyer_directory
- hospital_\&_doctor_directory
- photographer-directory
CWE