First published: Mon Apr 05 2021(Updated: )
The REST API endpoint get_users in the User Profile Picture WordPress plugin before 2.5.0 returned more information than was required for its functionality to users with the upload_files capability. This included password hashes, hashed user activation keys, usernames, emails, and other less sensitive information.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cozmoslabs User Profile Picture | <2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-24170.
The severity of CVE-2021-24170 is high with a CVSS score of 7.5.
The User Profile Picture WordPress plugin before version 2.5.0 is affected by CVE-2021-24170.
The vulnerability exposed password hashes, hashed user activation keys, usernames, emails, and other less sensitive information.
Yes, a fix is available for CVE-2021-24170. It is recommended to update to version 2.5.0 or later of the User Profile Picture plugin to mitigate the vulnerability.