[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fs8sgTpmI1tD1Ku4CnRtV0Rnuzsk-Un3xW6OxH5NdJAE":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-618f644b-a92c-4f7f-aaea-c03ee7d6e0f9-ultimate-member","ultimate-member-user-profile-user-registration-login-membership-plugin-arbitrary-file-deletionread","Ultimate Member – User Profile, User Registration, Login & Membership Plugin \u003C= 2.0.45 - Arbitrary File Deletion\u002FRead","The Ultimate Member – User Profile, User Registration, Login & Membership Plugin plugin for WordPress is vulnerable to arbitrary file deletion and reading when the file upload functionality is enabled for the user profile and registration forms in versions up to, and including 2.0.45. This is due to the fact that the plugin did not perform sufficient file path validation or restrict the files that users had access to when performing a file download or deletion. This makes it possible for low-level privileged attackers to delete arbitrary files such as the wp-config.php file and ultimately achieve remote code execution.","ultimate-member",null,"\u003C=2.0.45","2.0.46","critical",9.4,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:L","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2019-05-13 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F618f644b-a92c-4f7f-aaea-c03ee7d6e0f9?source=api-prod",1716]