CVE-2020-36666

HIGH

directory-pro <1.9.5 - Path Traversal

Title source: llm

Description

The directory-pro WordPress plugin before 1.9.5, final-user-wp-frontend-user-profiles WordPress plugin before 1.2.2, producer-retailer WordPress plugin through TODO, photographer-directory WordPress plugin before 1.0.9, real-estate-pro WordPress plugin before 1.7.1, institutions-directory WordPress plugin before 1.3.1, lawyer-directory WordPress plugin before 1.2.9, doctor-listing WordPress plugin before 1.3.6, Hotel Listing WordPress plugin before 1.3.7, fitness-trainer WordPress plugin before 1.4.1, wp-membership WordPress plugin before 1.5.7, sold by the same developer (e-plugins), do not implementing any security measures in some AJAX calls. For example in the file plugin.php, the function iv_directories_update_profile_setting() uses update_user_meta with any data provided by the ajax call, which can be used to give the logged in user admin capabilities. Since the plugins allow user registration via a custom form (even if the blog does not allow users to register) it makes any site using it vulnerable.

Scores

CVSS v3 8.8
EPSS 0.0028
EPSS Percentile 51.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

Status published

Affected Products (11)

e-plugins/directory_pro < 1.9.5
e-plugins/final_user < 1.2.2
e-plugins/fitness_trainer < 1.4.1
e-plugins/hospital_\&_doctor_directory < 1.3.6
e-plugins/hotel_directory < 1.3.7
e-plugins/institutions_directory < 1.3.1
e-plugins/lawyer_directory < 1.2.9
e-plugins/photographer-directory < 1.0.9
e-plugins/producer-retailer
e-plugins/real_estate_pro < 1.7.1
e-plugins/wp_membership < 1.5.7

Timeline

Published Mar 27, 2023
Tracked Since Feb 18, 2026