Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-24076 | The WP Data Access plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.3.7. This is due to a lack of authorization checks on the multiple_roles_update function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wpda_role[]' parameter during a profile update. This requires the 'Enable role management' setting to be enabled for the site. |
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | WP Data Access <= 5.3.7 - Authenticated (Subscriber+) Privilege Escalation | |
| Weaknesses | CWE-266 | |
| References |
|
Mon, 13 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:06:32.497Z
Reserved: 2023-04-05T14:11:38.079Z
Link: CVE-2023-1874
Updated: 2024-08-02T06:05:26.716Z
Status : Modified
Published: 2023-04-12T14:15:07.527
Modified: 2026-04-08T18:17:55.613
Link: CVE-2023-1874
No data.
OpenCVE Enrichment
No data.
EUVD