CVE-2018-0587 Details

CVE-2018-0587

Published: 2018-05-14
Last Modified: 2019-11-20
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Unrestricted file upload vulnerability in Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated users to upload arbitrary image files via unspecified vectors.

Analysis
Common Vulnerability Score System v2.0
Severity Medium
Base Score 4/10
Exploit Score 8/10
Access Vector Network
Access Complexity Low
Authentication Single
Impact Score 2.9/10
Confidentiality Impact None
Availability Impact None
Integrity Impact Partial
Vector String AV:N/AC:L/Au:S/C:N/I:P/A:N
Common Vulnerability Score System v3.1
Severity Medium
Base Score 4.3/10
Exploit Score 2.8/10
Access Vector Network
Access Complexity Low
Privileges Required Low
Impact Score 1.4/10
Confidentiality Impact None
Availability Impact None
Integrity Impact Low
Scope Unchanged
User Interaction None
Vector String CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:ultimatemember:user_profile_\&_membership:*:*:*:*:*:wordpress:*:* Yes - 2.0.4
References

http://jvn.jp/en/jp/JVN28804532/index.html
https://wordpress.org/plugins/ultimate-member/#developers
https://wpvulndb.com/vulnerabilities/9608

CVE ID
CVE-2018-0587
Published
2018-05-14
Modified
2019-11-20
CVSSv2.0
Medium
CVSSv3.1
Medium
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-434

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.