The Pie Register plugin before 2.0.14 for WordPress does not properly restrict access to certain functions in pie-register.php, which allows remote attackers to (1) add a user by uploading a crafted CSV file or (2) activate a user account via a verifyit action.
References
Configurations
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/62351 - | |
References | () http://security.szurek.pl/pie-register-2013-privilege-escalation.html - Exploit | |
References | () https://wordpress.org/plugins/pie-register/changelog/ - Vendor Advisory |
Information
Published : 2015-01-23 15:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-8802
Mitre link : CVE-2014-8802
CVE.ORG link : CVE-2014-8802
JSON object : View
Products Affected
genetechsolutions
- pie_register
CWE
CWE-264
Permissions, Privileges, and Access Controls