Output validation vulnerability in User Registration – Custom Registration Form, Login Form And User Profile For WordPress 3.0.1

The User Registration plugin for WordPress is a tool that allows users to create accounts on a WordPress website. Unfortunately, versions up to and including 3.0.1 of this plugin are vulnerable to a type of attack known as PHP Object Injection. This type of attack can occur when the plugin’s “profile-pic-url” parameter is given untrusted input. If an attacker is able to gain access to the website with a user account that has subscriber-level permissions or higher, they can exploit this vulnerability to inject a PHP Object. No chain of additional plugins or themes is required for this attack to be successful, but if any are present they could give the attacker additional capabilities such as deleting files, retrieving sensitive data, or executing code.

Detected in:

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.