Vulnerability Description
The UserPro plugin before 4.9.17.1 for WordPress, when used on a site with the "admin" username, allows remote attackers to bypass authentication and obtain administrative access via a "true" value for the up_auto_log parameter in the QUERY_STRING to the default URI.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Userproplugin | Userpro | < 4.9.17.1 |
Related Weaknesses (CWE)
References
- https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681?s_raIssue Tracking
- https://wpvulndb.com/vulnerabilities/8950Issue TrackingThird Party Advisory
- https://www.exploit-db.com/exploits/43117/ExploitIssue TrackingThird Party Advisory
- https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681?s_raIssue Tracking
- https://wpvulndb.com/vulnerabilities/8950Issue TrackingThird Party Advisory
- https://www.exploit-db.com/exploits/43117/ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2017-16562?
CVE-2017-16562 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The UserPro plugin before 4.9.17.1 for WordPress, when used on a site with the "admin" username, allows remote attackers to bypass authentication and obtain administrative access via a "true" value fo...
How severe is CVE-2017-16562?
CVE-2017-16562 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-16562?
Check the references section above for vendor advisories and patch information. Affected products include: Userproplugin Userpro.