The FundEngine plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.0. This is due to the plugin not properly verifying user meta updated through the update_user_meta function. This makes it possible for authenticated attackers, with subscriber-level access and above, to update their user meta which can be leveraged to update their capabilities to gain administrator access.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-47742 | The FundEngine plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.0. This is due to the plugin not properly verifying user meta updated through the update_user_meta function. This makes it possible for authenticated attackers, with subscriber-level access and above, to update their user meta which can be leveraged to update their capabilities to gain administrator access. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 23 Nov 2024 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wpmet fundengine
|
|
CPEs | cpe:2.3:a:wpmet:fundengine:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Wpmet fundengine
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T14:10:21.095Z
Reserved: 2024-07-11T15:47:40.488Z
Link: CVE-2024-6698

Updated: 2024-08-01T14:10:17.104Z

Status : Analyzed
Published: 2024-08-01T04:15:04.767
Modified: 2024-11-23T00:44:15.393
Link: CVE-2024-6698

No data.

No data.