{"api_version":"1","generated_at":"2026-04-23T15:09:03+00:00","cve":"CVE-2020-36157","urls":{"html":"https://cve.report/CVE-2020-36157","api":"https://cve.report/api/cve/CVE-2020-36157.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-36157","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-36157"},"summary":{"title":"CVE-2020-36157","description":"An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Unauthenticated Privilege Escalation via User Roles. Due to the lack of filtering on the role parameter that could be supplied during the registration process, an attacker could supply the role parameter with a WordPress capability (or any custom Ultimate Member role) and effectively be granted those privileges.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-01-04 18:15:00","updated_at":"2021-07-21 11:39:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/33f059c5-58e5-44b9-bb27-793c3cedef3b","name":"https://wpscan.com/vulnerability/33f059c5-58e5-44b9-bb27-793c3cedef3b","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"Ultimate Member < 2.1.12 - Unauthenticated Privilege Escalation via User Roles Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://wordpress.org/plugins/ultimate-member/#developers","name":"https://wordpress.org/plugins/ultimate-member/#developers","refsource":"MISC","tags":["Release Notes","Third Party Advisory"],"title":"Ultimate Member – User Profile & Membership Plugin | WordPress.org","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.wordfence.com/blog/2020/11/critical-privilege-escalation-vulnerabilities-affect-100k-sites-using-ultimate-member-plugin/","name":"https://www.wordfence.com/blog/2020/11/critical-privilege-escalation-vulnerabilities-affect-100k-sites-using-ultimate-member-plugin/","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"Critical Privilege Escalation Vulnerabilities Affect 100K Sites Using Ultimate Member Plugin","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-36157","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36157","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"36157","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ultimatemember","cpe5":"ultimate_member","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"36157","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ultimatemember","cpe5":"ultimate_member","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-36157","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Unauthenticated Privilege Escalation via User Roles. Due to the lack of filtering on the role parameter that could be supplied during the registration process, an attacker could supply the role parameter with a WordPress capability (or any custom Ultimate Member role) and effectively be granted those privileges."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://wordpress.org/plugins/ultimate-member/#developers","refsource":"MISC","name":"https://wordpress.org/plugins/ultimate-member/#developers"},{"url":"https://www.wordfence.com/blog/2020/11/critical-privilege-escalation-vulnerabilities-affect-100k-sites-using-ultimate-member-plugin/","refsource":"MISC","name":"https://www.wordfence.com/blog/2020/11/critical-privilege-escalation-vulnerabilities-affect-100k-sites-using-ultimate-member-plugin/"},{"url":"https://wpscan.com/vulnerability/33f059c5-58e5-44b9-bb27-793c3cedef3b","refsource":"MISC","name":"https://wpscan.com/vulnerability/33f059c5-58e5-44b9-bb27-793c3cedef3b"}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N","version":"3.1"}}},"nvd":{"publishedDate":"2021-01-04 18:15:00","lastModifiedDate":"2021-07-21 11:39:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.1.12","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"36157","Ordinal":"196663","Title":"CVE-2020-36157","CVE":"CVE-2020-36157","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"36157","Ordinal":"1","NoteData":"An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Unauthenticated Privilege Escalation via User Roles. Due to the lack of filtering on the role parameter that could be supplied during the registration process, an attacker could supply the role parameter with a WordPress capability (or any custom Ultimate Member role) and effectively be granted those privileges.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"36157","Ordinal":"2","NoteData":"2021-01-04","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"36157","Ordinal":"3","NoteData":"2021-01-04","Type":"Other","Title":"Modified"}]}}}