The FundEngine plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.0. This is due to the plugin not properly verifying user meta updated through the update_user_meta function. This makes it possible for authenticated attackers, with subscriber-level access and above, to update their user meta which can be leveraged to update their capabilities to gain administrator access.
Metrics
Affected Vendors & Products
References
History
Sat, 23 Nov 2024 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wpmet fundengine
|
|
CPEs | cpe:2.3:a:wpmet:fundengine:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Wpmet fundengine
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T14:10:21.095Z
Reserved: 2024-07-11T15:47:40.488Z
Link: CVE-2024-6698

Updated: 2024-08-01T14:10:17.104Z

Status : Analyzed
Published: 2024-08-01T04:15:04.767
Modified: 2024-11-23T00:44:15.393
Link: CVE-2024-6698

No data.