Vulnerability Description
The UserPlus plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0 due to insufficient restriction on the 'form_actions' and 'userplus_update_user_profile' functions. This makes it possible for unauthenticated attackers to specify their user role by supplying the 'role' parameter during a registration.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpuserplus | Userplus | <= 2.0 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/userplus/trunk/functions/user-functioProduct
- https://www.wordfence.com/threat-intel/vulnerabilities/id/2489e649-27f7-4ca0-865Third Party Advisory
FAQ
What is CVE-2024-9518?
CVE-2024-9518 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The UserPlus plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0 due to insufficient restriction on the 'form_actions' and 'userplus_update_user_profile' f...
How severe is CVE-2024-9518?
CVE-2024-9518 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-9518?
Check the references section above for vendor advisories and patch information. Affected products include: Wpuserplus Userplus.