CVE-2022-3384
CVSS V2 None
CVSS V3 None
Description
The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the populate_dropdown_options function that accepts user supplied input and passes it through call_user_func(). This is restricted to non-parameter PHP functions like phpinfo(); since user supplied parameters are not passed through the function. This makes it possible for authenticated attackers, with administrative privileges, to execute code on the server.
Overview
- CVE ID
- CVE-2022-3384
- Assigner
- security@wordfence.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-11-29T21:15:11.067
- Last Modified Date
- 2022-12-01T20:28:08.203
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:* | 1 | OR | 2.5.0 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/H4de5-7/vulnerabilities/blob/main/CVE-2022-3383%20%26%26%20CVE-2022-3384.md | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2805393%40ultimate-member&new=2805393%40ultimate-member&sfp_email=&sfph_mail= | Patch Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3384 | Third Party Advisory |
https://www.yuque.com/docs/share/8796eef9-ac4c-4339-96b4-6c21313ecf3e | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-3384 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3384 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-07 18:05:32 | Added to TrackCVE |