Vulnerability Description
The WPCOM Member plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.5.2.1. This is due to the plugin allowing arbitrary data to be passed to wp_insert_user() during registration. This makes it possible for unauthenticated attackers to update their role to that of an administrator during registration.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpcom | Wpcom Member | < 1.5.3 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wpcom-member/tags/1.5.2/includes/formIssue Tracking
- https://plugins.trac.wordpress.org/changeset/3147399/wpcom-member/trunk/includes
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ec7f3e0c-a07c-4082-9b6Third Party Advisory
FAQ
What is CVE-2024-7493?
CVE-2024-7493 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The WPCOM Member plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.5.2.1. This is due to the plugin allowing arbitrary data to be passed to wp_insert_u...
How severe is CVE-2024-7493?
CVE-2024-7493 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-7493?
Check the references section above for vendor advisories and patch information. Affected products include: Wpcom Wpcom Member.