The User Profile Picture plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.6.1 via the 'rest_api_change_profile_image' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to update the profile picture of any user.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-46819 The User Profile Picture plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.6.1 via the 'rest_api_change_profile_image' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to update the profile picture of any user.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T21:18:06.678Z

Reserved: 2024-06-04T16:21:34.354Z

Link: CVE-2024-5639

cve-icon Vulnrichment

Updated: 2024-08-01T21:18:06.678Z

cve-icon NVD

Status : Modified

Published: 2024-06-21T07:15:10.640

Modified: 2024-11-21T09:48:04.290

Link: CVE-2024-5639

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.