Vulnerabilities (CVE)

Filtered by vendor Ultimatemember Subscribe
Filtered by product User Profile \& Membership
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-0590 1 Ultimatemember 1 User Profile \& Membership 2023-12-10 4.0 MEDIUM 4.3 MEDIUM
Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated attackers to bypass access restriction to modify the other users profiles via unspecified vectors.
CVE-2018-0588 1 Ultimatemember 1 User Profile \& Membership 2023-12-10 6.4 MEDIUM 7.5 HIGH
Directory traversal vulnerability in the AJAX function of Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote attackers to read arbitrary files via unspecified vectors.
CVE-2018-0586 1 Ultimatemember 1 User Profile \& Membership 2023-12-10 4.0 MEDIUM 4.3 MEDIUM
Directory traversal vulnerability in the shortcodes function of Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated attackers to read arbitrary files via unspecified vectors.
CVE-2018-0587 1 Ultimatemember 1 User Profile \& Membership 2023-12-10 4.0 MEDIUM 4.3 MEDIUM
Unrestricted file upload vulnerability in Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated users to upload arbitrary image files via unspecified vectors.
CVE-2018-10234 1 Ultimatemember 1 User Profile \& Membership 2023-12-10 3.5 LOW 4.8 MEDIUM
Authenticated Cross site Scripting exists in the User Profile & Membership plugin before 2.0.11 for WordPress via the "Account Deletion Custom Text" input field on the wp-admin/admin.php?page=um_options&section=account page.
CVE-2018-10233 1 Ultimatemember 1 User Profile \& Membership 2023-12-10 6.8 MEDIUM 8.8 HIGH
The User Profile & Membership plugin before 2.0.7 for WordPress has no mitigations implemented against cross site request forgery attacks. This is a structural finding throughout the entire plugin.
CVE-2018-0589 1 Ultimatemember 1 User Profile \& Membership 2023-12-10 4.0 MEDIUM 4.3 MEDIUM
Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated attackers to bypass access restriction to add a new form in the 'Forms' page via unspecified vectors.