The FundEngine plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.0. This is due to the plugin not properly verifying user meta updated through the update_user_meta function. This makes it possible for authenticated attackers, with subscriber-level access and above, to update their user meta which can be leveraged to update their capabilities to gain administrator access.
                
            References
                    Configurations
                    History
                    23 Nov 2024, 00:44
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:wpmet:fundengine:*:*:*:*:*:wordpress:*:* | |
| First Time | Wpmet Wpmet fundengine | |
| References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3128099%40wp-fundraising-donation%2Ftrunk&old=3072093%40wp-fundraising-donation%2Ftrunk&sfp_email=&sfph_mail= - Patch | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/2ec6cf42-291b-452d-ad14-80ae1cd5ec5c?source=cve - Third Party Advisory | 
01 Aug 2024, 12:42
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
01 Aug 2024, 04:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-08-01 04:15
Updated : 2024-11-23 00:44
NVD link : CVE-2024-6698
Mitre link : CVE-2024-6698
CVE.ORG link : CVE-2024-6698
JSON object : View
Products Affected
                wpmet
- fundengine
CWE
                
                    
                        
                        CWE-862
                        
            Missing Authorization
