CVE-2020-36156: WordPress plugin vulnerability

An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Authenticated Privilege Escalation via Profile Update. Any user with wp-admin access to the profile.php page could supply the parameter um-role with a value set to any role (e.g., Administrator) during a profile update, and effectively escalate their privileges.

How to mitigate CVE-2020-36156

Time needed: 5 minutes.

Follow the instructions, as they will assist you in mitigating the WordPress vulnerability that been reported in CVE-2020-36156.

  1. Install the latest version of WordPress

    Navigate to the official WordPress website and download the latest version of WordPress. The latest version contains the CVE-2020-36156 fix.
    Update to the latest version

  2. Perform a vulnerability assessment

    Perform a scan on your WordPress environment(s), and check for vulnerabilities. Verify if CVE-2020-36156 has been mitigated.

  3. Utilize the references

    The CVE-2020-36156 references have been provided for a reason. Utilize these references and make sure that you are correctly informed.

References

  • wordpress.org/plugins/ultimate-member/#developers
  • wpscan.com/vulnerability/dd4c4ece-7206-4788-8747-f0c0f3ab0a53
  • www.wordfence.com/blog/2020/11/critical-privilege-escalation-vulnerabilities-affect-100k-sites-using-ultimate-member-plugin/
  • Share this information