{"api_version":"1","generated_at":"2026-04-08T07:47:36+00:00","cve":"CVE-2023-3460","urls":{"html":"https://cve.report/CVE-2023-3460","api":"https://cve.report/api/cve/CVE-2023-3460.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-3460","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-3460"},"summary":{"title":"CVE-2023-3460","description":"The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2023-07-04 08:15:00","updated_at":"2023-11-07 04:18:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://blog.wpscan.com/hacking-campaign-actively-exploiting-ultimate-member-plugin/","name":"https://blog.wpscan.com/hacking-campaign-actively-exploiting-ultimate-member-plugin/","refsource":"MISC","tags":[],"title":"Hacking Campaign Actively Exploiting Ultimate Member Plugin - WPScan WordPress Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://wpscan.com/vulnerability/694235c7-4469-4ffd-a722-9225b19e98d7","name":"https://wpscan.com/vulnerability/694235c7-4469-4ffd-a722-9225b19e98d7","refsource":"MISC","tags":[],"title":"Ultimate Member <= 2.6.6 - Unauthenticated Privilege Escalation WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-3460","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3460","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"3460","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ultimatemember","cpe5":"ultimate_member","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-3460","qid":"730836","title":"WordPress Plugin Ultimate Member Unauthenticated Privilege Escalation Vulnerability"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-3460","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-269 Improper Privilege Management"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Ultimate Member","version":{"version_data":[{"version_affected":"<","version_name":"0","version_value":"2.6.7"}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/694235c7-4469-4ffd-a722-9225b19e98d7","refsource":"MISC","name":"https://wpscan.com/vulnerability/694235c7-4469-4ffd-a722-9225b19e98d7"},{"url":"https://blog.wpscan.com/hacking-campaign-actively-exploiting-ultimate-member-plugin/","refsource":"MISC","name":"https://blog.wpscan.com/hacking-campaign-actively-exploiting-ultimate-member-plugin/"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Unknown"},{"lang":"en","value":"Marc Montpas"},{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2023-07-04 08:15:00","lastModifiedDate":"2023-11-07 04:18:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.6.7","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}