An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Unauthenticated Privilege Escalation via User Meta. An attacker could supply an array parameter for sensitive metadata, such as the wp_capabilities user meta that defines a user’s role. During the registration process, submitted registration details were passed to the update_profile function, and any metadata was accepted, e.g., wp_capabilities[administrator] for Administrator access.
How to mitigate CVE-2020-36155
Time needed: 5 minutes.
Follow the instructions, as they will assist you in mitigating the WordPress vulnerability that been reported in CVE-2020-36155.
- Install the latest version of WordPress
Navigate to the official WordPress website and download the latest version of WordPress. The latest version contains the CVE-2020-36155 fix.
- Perform a vulnerability assessment
Perform a scan on your WordPress environment(s), and check for vulnerabilities. Verify if CVE-2020-36155 has been mitigated.
- Utilize the references
The CVE-2020-36155 references have been provided for a reason. Utilize these references and make sure that you are correctly informed.