The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the populate_dropdown_options function that accepts user supplied input and passes it through call_user_func(). This is restricted to non-parameter PHP functions like phpinfo(); since user supplied parameters are not passed through the function. This makes it possible for authenticated attackers, with administrative privileges, to execute code on the server.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 31 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-01-31T18:22:55.780Z
Reserved: 2022-09-30T19:33:50.826Z
Link: CVE-2022-3384
Updated: 2024-08-03T01:07:06.585Z
Status : Modified
Published: 2022-11-29T21:15:11.067
Modified: 2024-11-21T07:19:25.050
Link: CVE-2022-3384
No data.
OpenCVE Enrichment
No data.
Weaknesses