[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f_iPz-_Ns3edSqr85t4fY_b4YzVms37IJ1pDtZ0P6kr0":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2019-15111","wp-front-end-profile-privilege-escalation","WP Front End Profile \u003C= 0.2.1 - Privilege Escalation","The WP Front End Profile plugin for WordPress is vulnerable to Privilege Escalation in versions up to, and including, 0.2.1. This is due to the registration form not properly validating the user meta that is supplied allowing attackers to set the wp_capabilities user meta. This makes it possible for unauthenticated attackers to gain access to an account with full administrative privileges.","wp-front-end-profile",null,"\u003C=0.2.1","0.2.2","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Privilege Management","2016-09-14 00:00:00","2025-06-10 13:04:52",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff8aefc77-b5fb-45b0-b3ba-67d850c72e77?source=api-prod",3192]