Description
WordPress Plugin Users Ultra Membership is prone to multiple vulnerabilities, including cross-site scripting and SQL injection vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials, to compromise the application, access or modify data or to exploit vulnerabilities in the underlying database. WordPress Plugin Users Ultra Membership version 1.5.62 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.5.63 or latest
References
http://pvagenas.com/vulnerabilities/users-ultra-blind-sql-injection/
http://pvagenas.com/vulnerabilities/users-ultra-persistence-xss/
https://www.exploit-db.com/exploits/38855/
https://www.exploit-db.com/exploits/38856/
https://packetstormsecurity.com/files/134604/WordPress-Users-Ultra-1.5.50-SQL-Injection.html
https://packetstormsecurity.com/files/134605/WordPress-Users-Ultra-1.5.50-Cross-Site-Scripting.html
Related Vulnerabilities
Atlassian Jira Incorrect Behavior Order: Validate Before Canonicalize Vulnerability (CVE-2022-26137)
WordPress Plugin Feedweb Cross-Site Scripting (1.8.8)
Django Resource Management Errors Vulnerability (CVE-2011-4137)
Joomla Incorrect Permission Assignment for Critical Resource Vulnerability (CVE-2011-4912)