The WP Data Access plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.3.7. This is due to a lack of authorization checks on the multiple_roles_update function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wpda_role[]' parameter during a profile update. This requires the 'Enable role management' setting to be enabled for the site.
Metrics
Affected Vendors & Products
References
History
Mon, 13 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-13T16:39:41.089Z
Reserved: 2023-04-05T14:11:38.079Z
Link: CVE-2023-1874

Updated: 2024-08-02T06:05:26.716Z

Status : Modified
Published: 2023-04-12T14:15:07.527
Modified: 2024-11-21T07:40:03.950
Link: CVE-2023-1874

No data.