The WP Data Access plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.3.7. This is due to a lack of authorization checks on the multiple_roles_update function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wpda_role[]' parameter during a profile update. This requires the 'Enable role management' setting to be enabled for the site.
References
Configurations
History
21 Nov 2024, 07:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/171825/WordPress-WP-Data-Access-5.3.7-Privilege-Escalation.html - Third Party Advisory, VDB Entry | |
References | () https://plugins.trac.wordpress.org/browser/wp-data-access/tags/5.3.7/WPDataRoles/WPDA_Roles.php#L50 - Not Applicable | |
References | () https://plugins.trac.wordpress.org/browser/wp-data-access/tags/5.3.8/WPDataRoles/WPDA_Roles.php#L23 - Not Applicable | |
References | () https://plugins.trac.wordpress.org/browser/wp-data-access/tags/5.3.8/WPDataRoles/WPDA_Roles.php#L50 - Not Applicable | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/8f562e33-2aef-46f0-8a65-691155ede9e7?source=cve - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
07 Nov 2023, 04:05
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2023-04-12 14:15
Updated : 2024-11-21 07:40
NVD link : CVE-2023-1874
Mitre link : CVE-2023-1874
CVE.ORG link : CVE-2023-1874
JSON object : View
Products Affected
wpdataaccess
- wp_data_access
CWE
No CWE.