The Pie Register plugin before 2.0.14 for WordPress does not properly restrict access to certain functions in pie-register.php, which allows remote attackers to (1) add a user by uploading a crafted CSV file or (2) activate a user account via a verifyit action.
References
Link | Resource |
---|---|
http://secunia.com/advisories/62351 | |
http://security.szurek.pl/pie-register-2013-privilege-escalation.html | Exploit |
https://wordpress.org/plugins/pie-register/changelog/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2015-01-23 15:59
Updated : 2024-02-04 18:35
NVD link : CVE-2014-8802
Mitre link : CVE-2014-8802
CVE.ORG link : CVE-2014-8802
JSON object : View
Products Affected
genetechsolutions
- pie_register
CWE
CWE-264
Permissions, Privileges, and Access Controls