Lucene search

K
nessusThis script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.WEB_APPLICATION_SCANNING_114054
HistoryOct 05, 2023 - 12:00 a.m.

Simple Membership Plugin For WordPress < 4.3.5 Multiple Vulnerabilities

2023-10-0500:00:00
This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
4
wordpress
membership plugin
vulnerabilities
account takeover
privilege escalation
input validation

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.1%

The WordPress Simple Member Plugin installed on the remote host is affected by multiple vulnerabilities as follows.

  • A Account Takeover Vulnerability due to missing input validation on the process_password_reset_using_link function which permits authenticated attackers to gain access to arbitrary accounts on the instance. (CVE-2023-41956)

  • A Privilege escalation due to missing input validation on the create_swpm_user function during the registration process. (CVE-2023-41957)

Note that the scanner has not tested for these issues but has instead relied only on the application’s self-reported version number.

No source data
VendorProductVersionCPE
simple-membership-pluginsimple_membership*cpe:2.3:a:simple-membership-plugin:simple_membership:*:*:*:*:*:wordpress:*:*

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.1%

Related for WEB_APPLICATION_SCANNING_114054