cve/2023/CVE-2023-6009.md
2024-06-18 02:51:15 +02:00

19 lines
1.1 KiB
Markdown

### [CVE-2023-6009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6009)
![](https://img.shields.io/static/v1?label=Product&message=UserPro%20-%20Community%20and%20User%20Profile%20WordPress%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%205.1.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-266%20Incorrect%20Privilege%20Assignment&color=brighgreen)
### Description
The UserPro plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.4 due to insufficient restriction on the 'userpro_update_user_profile' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wp_capabilities' parameter during a profile update.
### POC
#### Reference
- http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
- https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
#### Github
No PoCs found on GitHub currently.