The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the populate_dropdown_options function that accepts user supplied input and passes it through call_user_func(). This is restricted to non-parameter PHP functions like phpinfo(); since user supplied parameters are not passed through the function. This makes it possible for authenticated attackers, with administrative privileges, to execute code on the server.
Metrics
Affected Vendors & Products
References
History
Fri, 31 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-01-31T18:22:55.780Z
Reserved: 2022-09-30T19:33:50.826Z
Link: CVE-2022-3384

Updated: 2024-08-03T01:07:06.585Z

Status : Modified
Published: 2022-11-29T21:15:11.067
Modified: 2024-11-21T07:19:25.050
Link: CVE-2022-3384

No data.