The Pie Register plugin before 2.0.14 for WordPress does not properly restrict access to certain functions in pie-register.php, which allows remote attackers to (1) add a user by uploading a crafted CSV file or (2) activate a user account via a verifyit action.
References
Link | Resource |
---|---|
http://security.szurek.pl/pie-register-2013-privilege-escalation.html | Exploit |
http://secunia.com/advisories/62351 | |
https://wordpress.org/plugins/pie-register/changelog/ | Vendor Advisory |
Configurations
Information
Published : 2015-01-23 07:59
Updated : 2015-01-26 04:56
NVD link : CVE-2014-8802
Mitre link : CVE-2014-8802
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
genetechsolutions
- pie_register