{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2020-36666","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","dateReserved":"2023-03-06T09:23:56.829Z","datePublished":"2023-03-27T15:37:27.159Z","dateUpdated":"2025-02-19T20:09:36.125Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-03-27T15:37:27.159Z"},"title":"Multiple e-plugins - Subscriber+ Privilege Escalation","problemTypes":[{"descriptions":[{"description":"CWE-269 Improper Privilege Management","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"directory-pro","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.9.5"}],"defaultStatus":"unaffected"},{"vendor":"Unknown","product":"final-user-wp-frontend-user-profiles","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.2.2"}],"defaultStatus":"unaffected"},{"vendor":"Unknown","product":"producer-retailer","versions":[{"status":"affected","versionType":"custom","version":"0","lessThanOrEqual":"TODO"}],"defaultStatus":"affected"},{"vendor":"Unknown","product":"photographer-directory","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.0.9"}],"defaultStatus":"unaffected"},{"vendor":"Unknown","product":"real-estate-pro","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.7.1"}],"defaultStatus":"unaffected"},{"vendor":"Unknown","product":"institutions-directory","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.3.1"}],"defaultStatus":"unaffected"},{"vendor":"Unknown","product":"lawyer-directory","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.2.9"}],"defaultStatus":"unaffected"},{"vendor":"Unknown","product":"doctor-listing","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.3.6"}],"defaultStatus":"unaffected"},{"vendor":"Unknown","product":"Hotel Listing","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.3.7"}],"defaultStatus":"unaffected"},{"vendor":"Unknown","product":"fitness-trainer","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.4.1"}],"defaultStatus":"unaffected"},{"vendor":"Unknown","product":"wp-membership","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.5.7"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The directory-pro WordPress plugin before 1.9.5, final-user-wp-frontend-user-profiles WordPress plugin before 1.2.2, producer-retailer WordPress plugin through TODO, photographer-directory WordPress plugin before 1.0.9, real-estate-pro WordPress plugin before 1.7.1, institutions-directory WordPress plugin before 1.3.1, lawyer-directory WordPress plugin before 1.2.9, doctor-listing WordPress plugin before 1.3.6, Hotel Listing WordPress plugin before 1.3.7, fitness-trainer WordPress plugin before 1.4.1, wp-membership WordPress plugin before 1.5.7, sold by the same developer (e-plugins), do not implementing any security measures in some AJAX calls. For example in the file plugin.php, the function iv_directories_update_profile_setting() uses update_user_meta with any data provided by the ajax call, which can be used to give the logged in user admin capabilities. Since the plugins allow user registration via a custom form (even if the blog does not allow users to register) it makes any site using it vulnerable."}],"references":[{"url":"https://wpscan.com/vulnerability/d079cb16-ead5-4bc8-b0b8-4a4dc2a54c96","tags":["exploit","vdb-entry","technical-description"]},{"url":"https://codecanyon.net/user/e-plugins"}],"credits":[{"lang":"en","value":"Omar Badran","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T17:30:08.573Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/d079cb16-ead5-4bc8-b0b8-4a4dc2a54c96","tags":["exploit","vdb-entry","technical-description","x_transferred"]},{"url":"https://codecanyon.net/user/e-plugins","tags":["x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-02-19T20:09:08.852195Z","id":"CVE-2020-36666","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-19T20:09:36.125Z"}}]}}