Vulnerability Details CVE-2024-6698
The FundEngine plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.0. This is due to the plugin not properly verifying user meta updated through the update_user_meta function. This makes it possible for authenticated attackers, with subscriber-level access and above, to update their user meta which can be leveraged to update their capabilities to gain administrator access.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 51.2%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2024-6698
-
cpe:2.3:a:wpmet:fundengine:1.0.0
-
cpe:2.3:a:wpmet:fundengine:1.1.0
-
cpe:2.3:a:wpmet:fundengine:1.1.1
-
cpe:2.3:a:wpmet:fundengine:1.1.10
-
cpe:2.3:a:wpmet:fundengine:1.1.11
-
cpe:2.3:a:wpmet:fundengine:1.1.12
-
cpe:2.3:a:wpmet:fundengine:1.1.13
-
cpe:2.3:a:wpmet:fundengine:1.1.14
-
cpe:2.3:a:wpmet:fundengine:1.1.15
-
cpe:2.3:a:wpmet:fundengine:1.1.16
-
cpe:2.3:a:wpmet:fundengine:1.1.17
-
cpe:2.3:a:wpmet:fundengine:1.1.18
-
cpe:2.3:a:wpmet:fundengine:1.1.19
-
cpe:2.3:a:wpmet:fundengine:1.1.2
-
cpe:2.3:a:wpmet:fundengine:1.1.4
-
cpe:2.3:a:wpmet:fundengine:1.1.5
-
cpe:2.3:a:wpmet:fundengine:1.1.6
-
cpe:2.3:a:wpmet:fundengine:1.1.7
-
cpe:2.3:a:wpmet:fundengine:1.1.8
-
cpe:2.3:a:wpmet:fundengine:1.1.9
-
cpe:2.3:a:wpmet:fundengine:1.2.0
-
cpe:2.3:a:wpmet:fundengine:1.2.1
-
cpe:2.3:a:wpmet:fundengine:1.3.0
-
cpe:2.3:a:wpmet:fundengine:1.3.1
-
cpe:2.3:a:wpmet:fundengine:1.3.3
-
cpe:2.3:a:wpmet:fundengine:1.3.4
-
cpe:2.3:a:wpmet:fundengine:1.4.0
-
cpe:2.3:a:wpmet:fundengine:1.4.1
-
cpe:2.3:a:wpmet:fundengine:1.4.2
-
cpe:2.3:a:wpmet:fundengine:1.5.0
-
cpe:2.3:a:wpmet:fundengine:1.6.0
-
cpe:2.3:a:wpmet:fundengine:1.6.2
-
cpe:2.3:a:wpmet:fundengine:1.6.4
-
cpe:2.3:a:wpmet:fundengine:1.7.0