8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0004 Low
EPSS
Percentile
9.1%
The WordPress Simple Member Plugin installed on the remote host is affected by multiple vulnerabilities as follows.
A Account Takeover Vulnerability due to missing input validation on the process_password_reset_using_link function which permits authenticated attackers to gain access to arbitrary accounts on the instance. (CVE-2023-41956)
A Privilege escalation due to missing input validation on the create_swpm_user function during the registration process. (CVE-2023-41957)
Note that the scanner has not tested for these issues but has instead relied only on the application’s self-reported version number.
No source data
Vendor | Product | Version | CPE |
---|---|---|---|
simple-membership-plugin | simple_membership | * | cpe:2.3:a:simple-membership-plugin:simple_membership:*:*:*:*:*:wordpress:*:* |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41956
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41957
wordpress.org/plugins/simple-membership/
www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/simple-membership/simple-membership-434-account-takeover-via-password-reset
www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/simple-membership/simple-membership-434-privilege-escalation-via-registration