WordPress Plugin Vulnerabilities

Multiple e-plugins - Subscriber+ Privilege Escalation

Description

The plugins, sold by the same developer (e-plugins), do not implementing any security measures in some AJAX calls. For example in the file plugin.php, the function iv_directories_update_profile_setting() uses update_user_meta with any data provided by the ajax call, which can be used to give the logged in user admin capabilities. Since the plugins allow user registration via a custom form (even if the blog does not allow users to register) it makes any site using it vulnerable.

Proof of Concept

Affects Plugins

Fixed in 1.9.5
No known fix
Fixed in 1.7.1
Fixed in 1.2.9
Fixed in 1.3.6
Fixed in 1.3.7
Fixed in 1.4.1
Fixed in 1.5.7

References

Classification

Miscellaneous

Original Researcher
Omar Badran
Submitter
Omar Badran
Submitter website
Verified
Yes

Timeline

Publicly Published
2023-03-06 (about 2 years ago)
Added
2023-03-06 (about 2 years ago)
Last Updated
2023-03-06 (about 2 years ago)

Other