The UserPlus plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0 due to insufficient restriction on the 'form_actions' and 'userplus_update_user_profile' functions. This makes it possible for unauthenticated attackers to specify their user role by supplying the 'role' parameter during a registration.
References
Configurations
History
15 Oct 2024, 14:25
Type | Values Removed | Values Added |
---|---|---|
First Time |
Wpuserplus userplus
Wpuserplus |
|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:wpuserplus:userplus:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/userplus/trunk/functions/user-functions.php?rev=1604604#L47 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/2489e649-27f7-4ca0-8655-0957016fa89a?source=cve - Third Party Advisory |
10 Oct 2024, 12:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
10 Oct 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-10 02:15
Updated : 2024-10-15 14:25
NVD link : CVE-2024-9518
Mitre link : CVE-2024-9518
CVE.ORG link : CVE-2024-9518
JSON object : View
Products Affected
wpuserplus
- userplus
CWE