CRITICALCVE-2020-36832CVSS 9.8

Indeed Membership Pro 7.3 - 8.6 - Authentication Bypass

翻译中…

平台

wordpress

组件

ultimate-membership-pro

修复版本

8.6.1

AI Confidence: highNVDEPSS 0.6%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2020-36832 represents a critical Authentication Bypass vulnerability discovered in the Ultimate Membership Pro plugin for WordPress. This flaw allows unauthenticated attackers to gain unauthorized access to user accounts, potentially including administrator privileges. The vulnerability impacts versions 7.3 through 8.6.1, and a fix is available in version 8.6.1.

WordPress

检测此 CVE 是否影响你的项目

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。

影响与攻击场景翻译中…

The impact of this vulnerability is severe. An attacker can bypass authentication entirely and log in as any user on the WordPress site. This includes the site administrator, granting them full control over the website's content, configuration, and user accounts. Attackers could modify data, install malicious plugins, deface the site, or steal sensitive information. The ability to impersonate the administrator poses a significant risk to the integrity and confidentiality of the entire WordPress environment. This vulnerability shares similarities with other authentication bypass flaws where improper validation allows unauthorized access.

利用背景翻译中…

CVE-2020-36832 was publicly disclosed on October 16, 2024. While no public proof-of-concept (PoC) code has been widely released, the ease of exploitation makes it a high-priority concern. The vulnerability is not currently listed on CISA KEV, but its critical severity warrants close monitoring. Active exploitation is possible given the lack of a public PoC and the vulnerability's simplicity.

哪些人处于风险中翻译中…

Websites utilizing the Ultimate Membership Pro plugin, particularly those with default administrator credentials or weak password policies, are at significant risk. Shared WordPress hosting environments are also vulnerable, as a compromise of one site could potentially lead to the compromise of others on the same server.

检测步骤翻译中…

• wordpress / composer / npm:

grep -r 'wp_authenticate_key' /var/www/html/wp-content/plugins/ultimate-membership-pro/

• wordpress / composer / npm:

wp plugin list --status=active | grep ultimate-membership-pro

• wordpress / composer / npm:

wp plugin update ultimate-membership-pro

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.64% (70% 百分位)

CISA SSVC

利用情况none
可自动化yes
技术影响total

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityHigh数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
高 — 攻击者可写入、修改或删除任何数据。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件ultimate-membership-pro
供应商wpindeed
影响范围修复版本
7.3 – 8.6.18.6.1

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2020-36832 is to immediately upgrade the Ultimate Membership Pro plugin to version 8.6.1 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily restricting access to sensitive areas of the site and implementing stricter password policies. While not a complete solution, a Web Application Firewall (WAF) configured to block login attempts with suspicious usernames or user IDs could provide a temporary layer of protection. Review WordPress user accounts for any signs of unauthorized access.

修复方法翻译中…

Actualice el plugin Ultimate Membership Pro a la versión 8.6.1 o superior. Esta actualización corrige la vulnerabilidad de omisión de autenticación que permite a atacantes no autenticados iniciar sesión como cualquier usuario, incluido el administrador del sitio.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2020-36832 — Authentication Bypass in Ultimate Membership Pro?

CVE-2020-36832 is a critical vulnerability allowing unauthenticated attackers to log in as any user, including the administrator, in Ultimate Membership Pro versions 7.3 to 8.6.1.

Am I affected by CVE-2020-36832 in Ultimate Membership Pro?

If you are using Ultimate Membership Pro versions 7.3 through 8.6.1, you are vulnerable. Upgrade to 8.6.1 or later to mitigate the risk.

How do I fix CVE-2020-36832 in Ultimate Membership Pro?

Upgrade the Ultimate Membership Pro plugin to version 8.6.1 or later. If immediate upgrade is not possible, implement temporary restrictions and WAF rules.

Is CVE-2020-36832 being actively exploited?

While no public exploit is known, the vulnerability's simplicity suggests active exploitation is possible and should be monitored.

Where can I find the official Ultimate Membership Pro advisory for CVE-2020-36832?

Refer to the official Ultimate Membership Pro website and WordPress plugin repository for the latest advisory and update information.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。