First published: Tue Nov 29 2022(Updated: )
The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the get_option_value_from_callback function that accepts user supplied input and passes it through call_user_func(). This makes it possible for authenticated attackers, with administrative capabilities, to execute code on the server.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ultimate Member | <=2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-3383.
The severity of CVE-2022-3383 is high with a CVSS score of 7.2.
The Ultimate Member plugin for WordPress versions up to and including 2.5.0 is affected by CVE-2022-3383.
CVE-2022-3383 allows remote code execution through the get_option_value_from_callback function that accepts user supplied input and passes it through call_user_func().
Yes, CVE-2022-3383 can only be exploited by authenticated attackers.