WordPress Plugin Vulnerabilities
Advanced Access Manager < 6.6.2 - Authenticated Information Disclosure
Description
The plugin’s aam/v1/authenticate and aam/v2/authenticate REST endpoints were set to respond to a successful login with a json-encoded copy of all metadata about the user, potentially exposing users’ information to an attacker or low-privileged user. This included items like the user’s hashed password and their capabilities and roles, as well as any custom metadata that might have been added by other plugins. This might include sensitive configuration information, which an attacker could potentially use as part of an exploit chain.
Affects Plugins
References
Classification
Type
SENSITIVE DATA DISCLOSURE
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Ram Gall (Wordfence)
Verified
No
WPVDB ID
Timeline
Publicly Published
2020-08-20 (about 5 years ago)
Added
2020-08-20 (about 5 years ago)
Last Updated
2021-01-02 (about 5 years ago)