First published: Fri Jun 21 2019(Updated: )
An arbitrary password reset issue was discovered in the Ultimate Member plugin 2.39 for WordPress. It is possible (due to lack of verification and correlation between the reset password key sent by mail and the user_id parameter) to reset the password of another user. One only needs to know the user_id, which is publicly available. One just has to intercept the password modification request and modify user_id. It is possible to modify the passwords for any users or admin WordPress Ultimate Members. This could lead to account compromise and privilege escalation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ultimate Member | <2.0.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-10270.
The affected software for this vulnerability is Ultimate Member plugin 2.39 for WordPress.
The severity of CVE-2019-10270 is high with a severity value of 8.8.
It is possible to reset the password of another user by exploiting the lack of verification and correlation between the reset password key sent by mail and the user_id parameter.
There is no information available about a fix for this vulnerability. It is recommended to update to a newer version if available or apply any patches or mitigations provided by the vendor.