Логотип exploitDog
bind:CVE-2023-3636
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-3636

Количество 2

Количество 2

nvd логотип

CVE-2023-3636

больше 2 лет назад

The WP Project Manager plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.6.4 due to insufficient restriction on the 'save_users_map_name' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'usernames' parameter.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-74fq-c7c5-vcrm

больше 2 лет назад

The WP Project Manager plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.6.4 due to insufficient restriction on the 'save_users_map_name' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'usernames' parameter.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-3636

The WP Project Manager plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.6.4 due to insufficient restriction on the 'save_users_map_name' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'usernames' parameter.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-74fq-c7c5-vcrm

The WP Project Manager plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.6.4 due to insufficient restriction on the 'save_users_map_name' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'usernames' parameter.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу