First published: Wed Mar 13 2024(Updated: )
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ultimate Member | >=2.1.3<=2.8.2 | |
>=2.1.3<2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1071 has a high severity rating due to its potential for SQL Injection, which could allow attackers to manipulate the database.
To fix CVE-2024-1071, upgrade the Ultimate Member plugin to version 2.8.3 or later, which addresses the SQL Injection vulnerability.
CVE-2024-1071 affects versions 2.1.3 to 2.8.2 of the Ultimate Member plugin for WordPress.
CVE-2024-1071 is categorized as an SQL Injection vulnerability, resulting from insufficient input sanitization.
Yes, CVE-2024-1071 can potentially lead to unauthorized data exposure or manipulation of the database due to SQL Injection.