Page 6 of 44 results (0.026 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The ultimate-member plugin before 2.0.52 for WordPress has XSS during an account upgrade. El plugin ultimate-member anterior a la versión 2.0.52 para WordPress tiene XSS durante una actualización de cuenta. • https://wordpress.org/plugins/ultimate-member/#developers https://wpvulndb.com/vulnerabilities/9449 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in the Ultimate Member plugin 2.39 for WordPress. It allows unauthorized profile and cover picture modification. It is possible to modify the profile and cover picture of any user once one is connected. One can also modify the profiles and cover pictures of privileged users. To perform such a modification, one first needs to (for example) intercept an upload-picture request and modify the user_id parameter. • https://cxsecurity.com/issue/WLB-2019060120 • CWE-862: Missing Authorization •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An arbitrary password reset issue was discovered in the Ultimate Member plugin 2.39 for WordPress. It is possible (due to lack of verification and correlation between the reset password key sent by mail and the user_id parameter) to reset the password of another user. One only needs to know the user_id, which is publicly available. One just has to intercept the password modification request and modify user_id. It is possible to modify the passwords for any users or admin WordPress Ultimate Members. • https://cxsecurity.com/issue/WLB-2019060101 • CWE-269: Improper Privilege Management CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 1

A CSRF vulnerability in a logged-in user's profile edit form in the Ultimate Member plugin before 2.0.40 for WordPress allows attackers to become admin and subsequently extract sensitive information and execute arbitrary code. This occurs because the attacker can change the e-mail address in the administrator profile, and then the attacker is able to reset the administrator password using the WordPress "password forget" form. Una vulnerabilidad de Cross-Site Request Forgery (CSRF) en el formulario de edición del perfil de usuario conectado en el plugin Ultimate Member, en versiones anteriores a la 2.0.40 para WordPress, permite a los atacantes obtener acceso de administrador y, por consiguiente, extraer información sensible y ejecutar código arbitrario. Esto ocurre porque el atacante puede cambiar la dirección de correo electrónico en el perfil de administrador y, a continuación, restablecer la contraseña de administrador utilizando el formulario de WordPress "password forget".</ WordPress Ultimate Member plugin version 2.0.38 suffers from a cross site request forgery vulnerability. • http://packetstormsecurity.com/files/152315/WordPress-Ultimate-Member-2.0.38-Cross-Site-Request-Forgery.html https://wpvulndb.com/vulnerabilities/9250 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in includes/core/um-actions-login.php in the "Ultimate Member - User Profile & Membership" plugin before 2.0.28 for WordPress allow remote attackers to inject arbitrary web script or HTML via the "Primary button Text" or "Second button text" field. Múltiples vulnerabilidades Cross-Site Scripting (XSS) en includes/core/um-actions-login.php en el plugin Ultimate Member - User Profile Membership en versiones anteriores a la 2.0.28 para WordPress permite que los atacantes remotos inyecten scripts web o HTML arbitrarios mediante los campos "Primary button Text" o "Second button text". • https://serhack.me/articles/ultimate-member-xss-security-issue https://wordpress.org/plugins/ultimate-member/#developers https://wpvulndb.com/vulnerabilities/9615 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •