A critical security vulnerability has been unearthed in the popular Ultimate Member plugin for WordPress, potentially jeopardizing more than 200,000 websites that utilize this plugin. This alarming discovery was made by cyber researcher Christiaan Swiers, who diligently reported the flaw through the Wordfence Bug Bounty Program and received a generous bounty of $2,063.00 for his astute efforts.
The identified vulnerability in the Ultimate Member plugin pertains to an unauthenticated SQL Injection flaw, which could potentially allow malicious actors to extract highly sensitive data such as password hashes from the compromised websites’ databases. This type of vulnerability poses a significant threat to the integrity and security of the affected websites, putting user data and privacy at grave risk.
The flaw specifically affects versions 2.1.3 to 2.8.2 of the Ultimate Member plugin, primarily due to inadequate escaping of the ‘sorting’ parameter and a lack of preparation in the SQL query structure. This loophole could be exploited by cybercriminals using a Time-Based blind SQL injection technique, leveraging SQL CASE statements and the SLEEP() command to extract information based on the response time of each query request.
It is imperative to note that the vulnerability predominantly impacts users who have enabled the “Enable custom table for user meta” option, as the vulnerable Member_Directory_Meta class is only loaded under this particular configuration. This distinction highlights the critical nature of this security flaw and underscores the urgency for affected users to take immediate action to mitigate the risks posed by potential cyber threats.
In response to the disclosure of this security vulnerability, Wordfence promptly reported the issue to the Ultimate Member Team on January 30, 2024. Upon validation of the report and confirmation of the exploit, the Ultimate Member Team swiftly initiated the development of a patch to address the vulnerability. Subsequently, on February 19, 2024, the Ultimate Member Team released an updated version 2.8.3 of the plugin, containing the necessary fixes to mitigate the identified security flaw.
Wordfence strongly advises all users of the Ultimate Member plugin to promptly update to the latest patched version (2.8.3) to fortify their websites against potential cyber attacks and data breaches. Proactive measures such as installing security patches and updates are crucial in safeguarding digital assets and ensuring the overall security posture of online platforms.
In conclusion, the discovery of the SQL Injection vulnerability in the Ultimate Member plugin underscores the ever-present cybersecurity risks faced by website owners and administrators. By remaining vigilant, staying informed about potential security threats, and promptly applying software updates, users can bolster the resilience of their websites and enhance their defense mechanisms against malicious activities.
