WordPress Plugin Vulnerabilities
Multiple e-plugins - Subscriber+ Privilege Escalation
Description
The plugins, sold by the same developer (e-plugins), do not implementing any security measures in some AJAX calls. For example in the file plugin.php, the function iv_directories_update_profile_setting() uses update_user_meta with any data provided by the ajax call, which can be used to give the logged in user admin capabilities. Since the plugins allow user registration via a custom form (even if the blog does not allow users to register) it makes any site using it vulnerable.
Proof of Concept
Affects Plugins
References
Classification
Type
PRIVESC
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Omar Badran
Submitter
Omar Badran
Submitter website
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-03-06 (about 2 years ago)
Added
2023-03-06 (about 2 years ago)
Last Updated
2023-03-06 (about 2 years ago)