The UserPlus plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 2.0. This makes it possible for authenticated attackers with subscriber-level permissions or above, to add, modify, or delete user meta and plugin options.
History

Tue, 15 Oct 2024 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Wpuserplus
Wpuserplus userplus
CPEs cpe:2.3:a:wpuserplus:userplus:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpuserplus
Wpuserplus userplus

Thu, 10 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 10 Oct 2024 02:45:00 +0000

Type Values Removed Values Added
Description The UserPlus plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 2.0. This makes it possible for authenticated attackers with subscriber-level permissions or above, to add, modify, or delete user meta and plugin options.
Title UserPlus <= 2.0 - Missing Authorization via Multiple Functions
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-10T02:06:13.172Z

Updated: 2024-10-10T14:25:35.021Z

Reserved: 2024-10-04T12:11:50.517Z

Link: CVE-2024-9520

cve-icon Vulnrichment

Updated: 2024-10-10T14:25:29.207Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-10T03:15:03.177

Modified: 2024-10-15T14:34:59.660

Link: CVE-2024-9520

cve-icon Redhat

No data.