Home

Description

The Ultimate Member plugin for WordPress is vulnerable to Profile Privacy Setting Bypass in all versions up to, and including, 2.11.0. This is due to a flaw in the secure fields mechanism where field keys are stored in the allowed fields list before the `required_perm` check is applied during rendering. This makes it possible for authenticated attackers with Subscriber-level access to modify their profile privacy settings (e.g., setting profile to "Only me") via direct parameter manipulation, even when the administrator has explicitly disabled the option for their role.

PUBLISHED Reserved 2025-12-05 | Published 2025-12-17 | Updated 2025-12-17 | Assigner Wordfence




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-863 Incorrect Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-05:Vendor Notified
2025-12-16:Disclosed

Credits

Boris Bogosavac finder

References

www.wordfence.com/...-c385-491f-a5a2-32906df4b52b?source=cve

plugins.trac.wordpress.org/...es/core/um-actions-account.php

plugins.trac.wordpress.org/...ncludes/core/class-account.php

plugins.trac.wordpress.org/changeset/3421362/

cve.org (CVE-2025-14081)

nvd.nist.gov (CVE-2025-14081)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.