[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fqpGunIhjq4KnxLjqHouo5dUhMntnM6PLK0b3_lNvMAQ":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-6695","user-profile-builder-beautiful-user-registration-forms-user-profiles-user-role-editor-authentication-bypass","User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor \u003C= 3.11.8 - Authentication Bypass","The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.11.8. This is due to the plugin not properly handling the user registration flow and utilizing different functionality at different stages of the process. This makes it possible for unauthenticated attackers to login as other users granted they know the user's email address. Successful exploitation requires the user registration and the 'Automatically Log In' features (disabled by default) to be enabled.","profile-builder",null,"\u003C=3.11.8","3.11.9","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Authentication Bypass Using an Alternate Path or Channel","2024-07-10 00:00:00","2024-07-23 21:00:52",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F2c9fa6f9-a549-4629-862f-f9a47b13aa59?source=api-prod",14]