cve-2021-24655
Vulnerability from cvelistv5
Published
2022-07-17 10:35
Modified
2024-08-03 19:35
Severity ?
EPSS score ?
Summary
The WP User Manager WordPress plugin before 2.6.3 does not ensure that the user ID to reset the password of is related to the reset key given. As a result, any authenticated user can reset the password (to an arbitrary value) of any user knowing only their ID, and gain access to their account.
References
▼ | URL | Tags | |
---|---|---|---|
contact@wpscan.com | https://wpscan.com/vulnerability/cce03550-7f65-4172-819e-025755fb541f | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wpscan.com/vulnerability/cce03550-7f65-4172-819e-025755fb541f | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | WP User Manager – User Profile Builder & Membership |
Version: 2.6.3 < 2.6.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:35:20.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/cce03550-7f65-4172-819e-025755fb541f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WP User Manager \u2013 User Profile Builder \u0026 Membership", "vendor": "Unknown", "versions": [ { "lessThan": "2.6.3", "status": "affected", "version": "2.6.3", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "AyeCode Ltd" } ], "descriptions": [ { "lang": "en", "value": "The WP User Manager WordPress plugin before 2.6.3 does not ensure that the user ID to reset the password of is related to the reset key given. As a result, any authenticated user can reset the password (to an arbitrary value) of any user knowing only their ID, and gain access to their account." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639 Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-17T10:35:28", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/cce03550-7f65-4172-819e-025755fb541f" } ], "source": { "discovery": "EXTERNAL" }, "title": "WP User Manager \u003c 2.6.3 - Arbitrary User Password Reset to Account Compromise", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24655", "STATE": "PUBLIC", "TITLE": "WP User Manager \u003c 2.6.3 - Arbitrary User Password Reset to Account Compromise" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WP User Manager \u2013 User Profile Builder \u0026 Membership", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2.6.3", "version_value": "2.6.3" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "AyeCode Ltd" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The WP User Manager WordPress plugin before 2.6.3 does not ensure that the user ID to reset the password of is related to the reset key given. As a result, any authenticated user can reset the password (to an arbitrary value) of any user knowing only their ID, and gain access to their account." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-639 Authorization Bypass Through User-Controlled Key" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/cce03550-7f65-4172-819e-025755fb541f", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/cce03550-7f65-4172-819e-025755fb541f" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24655", "datePublished": "2022-07-17T10:35:28", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:35:20.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-24655\",\"sourceIdentifier\":\"contact@wpscan.com\",\"published\":\"2022-07-17T11:15:08.367\",\"lastModified\":\"2024-11-21T05:53:30.103\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The WP User Manager WordPress plugin before 2.6.3 does not ensure that the user ID to reset the password of is related to the reset key given. As a result, any authenticated user can reset the password (to an arbitrary value) of any user knowing only their ID, and gain access to their account.\"},{\"lang\":\"es\",\"value\":\"El plugin WP User Manager de WordPress versiones anteriores a 2.6.3, no asegura que el ID de usuario para restablecer la contrase\u00f1a est\u00e9 relacionado con la clave de restablecimiento dada. Como resultado, cualquier usuario autenticado puede restablecer la contrase\u00f1a (a un valor arbitrario) de cualquier usuario conociendo s\u00f3lo su ID, y conseguir acceso a su cuenta\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:P/A:P\",\"baseScore\":6.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.8,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"contact@wpscan.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-639\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wpusermanager:wp_user_manager:*:*:*:*:*:wordpress:*:*\",\"versionEndExcluding\":\"2.6.3\",\"matchCriteriaId\":\"228BCB6C-F487-4754-978A-BBFCC50D112F\"}]}]}],\"references\":[{\"url\":\"https://wpscan.com/vulnerability/cce03550-7f65-4172-819e-025755fb541f\",\"source\":\"contact@wpscan.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://wpscan.com/vulnerability/cce03550-7f65-4172-819e-025755fb541f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.