mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
89 lines
2.7 KiB
JSON
89 lines
2.7 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-3460",
|
|
"ASSIGNER": "contact@wpscan.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-269 Improper Privilege Management"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Unknown",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Ultimate Member",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "0",
|
|
"version_value": "2.6.7"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://wpscan.com/vulnerability/694235c7-4469-4ffd-a722-9225b19e98d7",
|
|
"refsource": "MISC",
|
|
"name": "https://wpscan.com/vulnerability/694235c7-4469-4ffd-a722-9225b19e98d7"
|
|
},
|
|
{
|
|
"url": "https://blog.wpscan.com/hacking-campaign-actively-exploiting-ultimate-member-plugin/",
|
|
"refsource": "MISC",
|
|
"name": "https://blog.wpscan.com/hacking-campaign-actively-exploiting-ultimate-member-plugin/"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "WPScan CVE Generator"
|
|
},
|
|
"source": {
|
|
"discovery": "EXTERNAL"
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unknown"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "Marc Montpas"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "WPScan"
|
|
}
|
|
]
|
|
} |