The User Role Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.64.3. This is due to missing or incorrect nonce validation on the update_roles() function. This makes it possible for unauthenticated attackers to add or remove roles for arbitrary users, including escalating their privileges to administrator, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 17 Dec 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The User Role Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.64.3. This is due to missing or incorrect nonce validation on the update_roles() function. This makes it possible for unauthenticated attackers to add or remove roles for arbitrary users, including escalating their privileges to administrator, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
Title | User Role Editor <= 4.64.3 - Cross-Site Request Forgery to Privilege Escalation | |
Weaknesses | CWE-352 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2024-12-17T08:22:46.918Z
Updated: 2024-12-17T14:28:52.194Z
Reserved: 2024-12-05T23:27:38.711Z
Link: CVE-2024-12293

Updated: 2024-12-17T14:28:44.491Z

Status : Received
Published: 2024-12-17T09:15:05.347
Modified: 2024-12-17T09:15:05.347
Link: CVE-2024-12293

No data.