First published: Thu Aug 31 2023(Updated: )
The WP Project Manager plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.6.4 due to insufficient restriction on the 'save_users_map_name' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'usernames' parameter.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wedevs Wp Project Manager | <2.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-3636.
The severity of CVE-2023-3636 is high with a severity score of 8.8.
Versions up to, and including, 2.6.4 of the WP Project Manager plugin for WordPress are affected by CVE-2023-3636.
An authenticated attacker, even with minimal permissions such as a subscriber, can exploit CVE-2023-3636 to perform privilege escalation and modify certain functions of the plugin.
Yes, you can find references for CVE-2023-3636 at the following URLs: [link1](https://plugins.trac.wordpress.org/browser/wedevs-project-manager/tags/2.6.3/src/User/Controllers/User_Controller.php#L158), [link2](https://plugins.trac.wordpress.org/changeset/2942291/wedevs-project-manager#file1792), [link3](https://www.wordfence.com/threat-intel/vulnerabilities/id/6a5e4708-db3e-483c-852f-1a487825cf92?source=cve)