
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-6695 is a critical vulnerability discovered in Profile Builder, a WordPress plugin with over 50,000 active installations. The vulnerability was identified on July 10th, 2024, and affects versions prior to 3.11.9. It allows attackers to gain administrative access to WordPress sites without requiring any existing user account, due to improper logic flow in the user registration process (WPScan Blog, Security Online).
The vulnerability has been assigned a CVSS v3.1 score of 9.8 (Critical). The issue stems from inconsistencies in how the plugin handles user-provided email information during the registration process. After a user creates an account, the plugin generates a security nonce and uses it along with the user ID for automatic login. The flaw exists in the automatic login process where email validation at various stages is inconsistent, creating an exploitable condition (WPScan Blog).
The vulnerability allows attackers to gain unauthorized administrative access to WordPress sites running the affected versions of Profile Builder. This level of access enables attackers to perform any administrative actions on the targeted website, potentially compromising the entire site's security and integrity (Security Online).
The vulnerability has been patched in Profile Builder version 3.11.9, released on July 11th, 2024. Website owners using Profile Builder are strongly advised to update to this version immediately to prevent potential exploitation (WPScan Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."