The ForumWP – Forum & Discussion Board Plugin plugin for WordPress is vulnerable to Privilege Escalation via Insecure Direct Object Reference in all versions up to, and including, 2.0.2 via the submit_form_handler due to missing validation on the 'user_id' user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to change the email address of administrative user accounts which can then be leveraged to reset the administrative users password and gain access to their account.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ultimatemember
Ultimatemember forumwp |
|
CPEs | cpe:2.3:a:ultimatemember:forumwp:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Ultimatemember
Ultimatemember forumwp |
Fri, 06 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Forumwp
Forumwp forumwp |
|
CPEs | cpe:2.3:a:forumwp:forumwp:*:*:*:*:*:*:*:* | |
Vendors & Products |
Forumwp
Forumwp forumwp |
|
Metrics |
ssvc
|
Fri, 06 Sep 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The ForumWP – Forum & Discussion Board Plugin plugin for WordPress is vulnerable to Privilege Escalation via Insecure Direct Object Reference in all versions up to, and including, 2.0.2 via the submit_form_handler due to missing validation on the 'user_id' user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to change the email address of administrative user accounts which can then be leveraged to reset the administrative users password and gain access to their account. | |
Title | ForumWP – Forum & Discussion Board Plugin <= 2.0.2 - Insecure Direct Object Reference to Authenticated (Subscriber+) Privilege Escalation via Account Takeover | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-09-06T14:11:40.631Z
Reserved: 2024-09-04T15:06:42.231Z
Link: CVE-2024-8428

Updated: 2024-09-06T14:11:36.672Z

Status : Analyzed
Published: 2024-09-06T14:15:13.823
Modified: 2024-09-26T21:58:45.393
Link: CVE-2024-8428

No data.