Lucene search

K
cve[email protected]CVE-2022-3384
HistoryNov 29, 2022 - 9:15 p.m.

CVE-2022-3384

2022-11-2921:15:11
web.nvd.nist.gov
32
5
ultimate member
wordpress
remote code execution
vulnerability
cve-2022-3384
nvd

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.6%

The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the populate_dropdown_options function that accepts user supplied input and passes it through call_user_func(). This is restricted to non-parameter PHP functions like phpinfo(); since user supplied parameters are not passed through the function. This makes it possible for authenticated attackers, with administrative privileges, to execute code on the server.

Affected configurations

Vulners
NVD
Node
ultimatememberuser_profile_\&_membershipRange2.5.0
VendorProductVersionCPE
ultimatememberuser_profile_\&_membership*cpe:2.3:a:ultimatemember:user_profile_\&_membership:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "ultimatemember",
    "product": "Ultimate Member – User Profile, User Registration, Login & Membership Plugin",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "2.5.0",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

Social References

More

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.6%