
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2020-11514) was discovered in the WordPress SEO Plugin Rank Math versions below 1.0.41. This critical security flaw allowed unauthenticated attackers to modify user permissions through an unprotected REST API endpoint. The vulnerability was disclosed on March 31, 2020, affecting over 200,000 WordPress sites (Wordfence Blog).
The vulnerability stemmed from a REST-API endpoint, 'rankmath/v1/updateMeta', which lacked a permission_callback for capability checking. The endpoint called an update_metadata function that could be exploited to update or delete metadata for posts, comments, terms, and users. Most critically, since WordPress user permissions are stored in the usermeta table, attackers could manipulate administrative privileges for any registered user. The vulnerability received a CVSS score of 9.8 (Critical) (Wordfence Blog).
The vulnerability allowed unauthenticated attackers to grant or revoke administrative privileges for any registered user on the affected WordPress sites. This could lead to complete site takeover by manipulating user permissions through the exposed API endpoint (WPScan).
The vulnerability was patched in Rank Math version 1.0.41. Site administrators were strongly advised to update to this version or later to protect their websites. The fix implemented proper permission checking for the REST API endpoint (Wordfence Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."