Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin

Information

Software Type Plugin
Software Slug ultimate-member (view on wordpress.org)
Software Status Active
Software Author ultimatemember
Software Website ultimatemember.com
Software Downloads 10,969,148
Software Active Installs 200,000
Software Record Last Updated December 11, 2024

Showing 1-20 of 58 Vulnerabilities

5.4
CVE ID Unknown
Jul 15, 2022
Researchers:
7.5
CVE ID Unknown
Jul 14, 2022
Researchers:
Title Status CVE ID CVSS Researchers Date
Ultimate Member <= 2.8.9 - Missing Authorization to Authenticated (Subscriber+) Arbitrary User Profile Picture Update Patched CVE-2024-10528 4.3 tiborisaak November 20, 2024
Ultimate Member <= 2.8.6 - Cross-Site Request Forgery to Membership Status Change Patched CVE-2024-8520 5.3 Jack Taylor October 3, 2024
Ultimate Member <= 2.8.6 - Authenticated (Contributor+) Stored Cross-Site Scripting Patched CVE-2024-8519 6.4 Jack Taylor October 3, 2024
Ultimate Member <= 2.8.4 - Authenticated (Subscriber+) Stored Cross-Site Scripting Patched CVE-2024-2765 5.4 tiborisaak April 10, 2024
Ultimate Member <= 2.8.3 - Unauthenticated Stored Cross-Site Scripting Patched CVE-2024-2123 7.2 stealthcopter March 8, 2024
Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin 2.1.3 - 2.8.2 - Unauthenticated SQL Injection Patched CVE-2024-1071 9.8 Christiaan Swiers (YouGina) February 23, 2024
Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin <= 2.6.8 - Cross-Site Request Forgery Patched 4.3 August 8, 2023
Ultimate Member <= 2.6.6 - Privilege Escalation via Arbitrary User Meta Updates Patched CVE-2023-3460 9.8 Marc-Alexandre Montpas June 29, 2023
Ultimate Member <= 2.6.0 - Cross-Site Request Forgery to Form Duplication Patched CVE-2023-31216 4.3 Nguyen Xuan Chien May 30, 2023
Ultimate Member – User Profile, User Registration, Login & Membership Plugin <= 2.5.0 - Authenticated (Admin+) Remote Code Execution via Multi-Select Patched CVE-2022-3383 7.2 Ruijie Li October 28, 2022
Ultimate Member – User Profile, User Registration, Login & Membership Plugin <= 2.5.0 - Authenticated (Contributor+) Directory Traversal via Shortcodes Patched CVE-2022-3361 4.3 Ruijie Li October 28, 2022
Ultimate Member – User Profile, User Registration, Login & Membership Plugin <= 2.5.0 - Authenticated (Admin+) Limited Remote Code Execution via um_populate_dropdown_options Patched CVE-2022-3384 7.2 Ruijie Li October 28, 2022
Ultimate Member – User Profile, User Registration, Login & Membership Plugin <= 2.5.0 - Authenticated (Admin+) Directory Traversal Patched CVE-2022-2445 4.7 Ruijie Li October 28, 2022
Ultimate Member <= 2.4.0 - Subscriber+ Stored Cross-Site Scripting Patched 5.4 July 15, 2022
Ultimate Member <= 2.4.1 - Username Enumeration Patched 7.5 July 14, 2022
Ultimate Member <= 2.3.1 - Arbitrary Redirect Patched CVE-2022-1209 4.3 Ruijie Li April 29, 2022
Ultimate Member <= 2.3.2 - Stored Cross-Site Scripting Patched CVE-2022-1208 6.4 Ruijie Li March 21, 2022
Ultimate Member <= 2.1.19 - Reflected Cross-Site Scripting Patched CVE-2021-24306 6.1 riki aji May 7, 2021
Ultimate Member <= 2.1.12 - Cross-Site Scripting Patched CVE-2020-36170 6.5 December 9, 2020
Ultimate Member <= 2.1.11 - Unauthenticated Privilege Escalation via User Meta Patched CVE-2020-36155 10.0 Chloe Chamberland November 9, 2020

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation