First published: Fri Jan 01 2021(Updated: )
The Advanced Access Manager plugin before 6.6.2 for WordPress displays the unfiltered user object (including all metadata) upon login via the REST API (aam/v1/authenticate or aam/v2/authenticate). This is a security problem if this object stores information that the user is not supposed to have (e.g., custom metadata added by a different plugin).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Vasyltech Advanced Access Manager | <6.6.2 | |
WordPress Advanced Access Manager | <6.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35934 is classified as a high-severity vulnerability due to the exposure of unfiltered user objects.
To fix CVE-2020-35934, you should update the Advanced Access Manager plugin to version 6.6.2 or later.
CVE-2020-35934 affects users of the Advanced Access Manager plugin for WordPress versions prior to 6.6.2.
The consequences of CVE-2020-35934 include unauthorized access to sensitive user metadata through the REST API.
Yes, a patch is available in the Advanced Access Manager plugin version 6.6.2 and later.