The UserPlus plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0 due to insufficient restriction on the 'form_actions' and 'userplus_update_user_profile' functions. This makes it possible for unauthenticated attackers to specify their user role by supplying the 'role' parameter during a registration.
History

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Userplus
Userplus user Registration And User Profile
CPEs cpe:2.3:a:userplus:user_registration_and_user_profile:*:*:*:*:*:*:*:*
Vendors & Products Userplus
Userplus user Registration And User Profile
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 10 Oct 2024 02:15:00 +0000

Type Values Removed Values Added
Description The UserPlus plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0 due to insufficient restriction on the 'form_actions' and 'userplus_update_user_profile' functions. This makes it possible for unauthenticated attackers to specify their user role by supplying the 'role' parameter during a registration.
Title UserPlus <= 2.0 - Unauthenticated Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-10T02:06:05.859Z

Updated: 2024-10-10T17:53:12.553Z

Reserved: 2024-10-04T12:11:24.815Z

Link: CVE-2024-9518

cve-icon Vulnrichment

Updated: 2024-10-10T17:53:05.588Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-10T02:15:05.590

Modified: 2024-10-10T12:51:56.987

Link: CVE-2024-9518

cve-icon Redhat

No data.