The UserPlus plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0 due to insufficient restriction on the 'form_actions' and 'userplus_update_user_profile' functions. This makes it possible for unauthenticated attackers to specify their user role by supplying the 'role' parameter during a registration.
History

Tue, 15 Oct 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Wpuserplus
Wpuserplus userplus
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:wpuserplus:userplus:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpuserplus
Wpuserplus userplus

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Userplus
Userplus user Registration And User Profile
CPEs cpe:2.3:a:userplus:user_registration_and_user_profile:*:*:*:*:*:*:*:*
Vendors & Products Userplus
Userplus user Registration And User Profile
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 10 Oct 2024 02:15:00 +0000

Type Values Removed Values Added
Description The UserPlus plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0 due to insufficient restriction on the 'form_actions' and 'userplus_update_user_profile' functions. This makes it possible for unauthenticated attackers to specify their user role by supplying the 'role' parameter during a registration.
Title UserPlus <= 2.0 - Unauthenticated Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-10T02:06:05.859Z

Updated: 2024-10-10T17:53:12.553Z

Reserved: 2024-10-04T12:11:24.815Z

Link: CVE-2024-9518

cve-icon Vulnrichment

Updated: 2024-10-10T17:53:05.588Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-10T02:15:05.590

Modified: 2024-10-15T14:25:58.540

Link: CVE-2024-9518

cve-icon Redhat

No data.