WordPress Plugin Vulnerabilities

Advanced Access Manager < 6.6.2 - Authenticated Information Disclosure

Description

The plugin’s aam/v1/authenticate and aam/v2/authenticate REST endpoints were set to respond to a successful login with a json-encoded copy of all metadata about the user, potentially exposing users’ information to an attacker or low-privileged user. This included items like the user’s hashed password and their capabilities and roles, as well as any custom metadata that might have been added by other plugins. This might include sensitive configuration information, which an attacker could potentially use as part of an exploit chain.

Affects Plugins

References

Classification

Type
SENSITIVE DATA DISCLOSURE
CWE

Miscellaneous

Original Researcher
Ram Gall (Wordfence)
Verified
No

Timeline

Publicly Published
2020-08-20 (about 5 years ago)
Added
2020-08-20 (about 5 years ago)
Last Updated
2021-01-02 (about 5 years ago)

Other