The FundEngine plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.0. This is due to the plugin not properly verifying user meta updated through the update_user_meta function. This makes it possible for authenticated attackers, with subscriber-level access and above, to update their user meta which can be leveraged to update their capabilities to gain administrator access.
References
Configurations
History
23 Nov 2024, 00:44
Type | Values Removed | Values Added |
---|---|---|
First Time |
Wpmet
Wpmet fundengine |
|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3128099%40wp-fundraising-donation%2Ftrunk&old=3072093%40wp-fundraising-donation%2Ftrunk&sfp_email=&sfph_mail= - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/2ec6cf42-291b-452d-ad14-80ae1cd5ec5c?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:wpmet:fundengine:*:*:*:*:*:wordpress:*:* |
01 Aug 2024, 12:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 Aug 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-01 04:15
Updated : 2024-11-23 00:44
NVD link : CVE-2024-6698
Mitre link : CVE-2024-6698
CVE.ORG link : CVE-2024-6698
JSON object : View
Products Affected
wpmet
- fundengine
CWE
CWE-862
Missing Authorization