Advanced Access Manager <= 6.6.1 - Authenticated Information Disclosure
The Advanced Access Manager plugin before 6.6.2 for WordPress displays the unfiltered user object (including all metadata) upon login via the REST API (aam/v1/authenticate or aam/v2/authenticate). This is a security problem if this object stores information that the user is not supposed to have (e.g., custom metadata added by a different plugin).
CVE-2020-35934 is a medium severity with CVSS 4.3 Vulnerability issue affecting the Plugin Advanced Access Manager – Access Governance for WordPress. It affects Versions up to 6.6.1 and is fixed in 6.6.2.
CVE-2020-35934 is tracked for the Plugin Advanced Access Manager – Access Governance for WordPress as medium severity with CVSS 4.3. The affected range is Versions up to 6.6.1. Update Advanced Access Manager – Access Governance for WordPress to 6.6.2 or newer where that version is compatible with the site.
| Software Type | Plugin |
|---|---|
| Software Slug |
advanced-access-manager
View on wordpress.org
|
| CVE | CVE-2020-35934 |
| Patched Versions |
6.6.2
|
| Affected Versions |
Versions up to 6.6.1
|
Related CVEs for Advanced Access Manager – Access Governance for WordPress
These internal links group the same WordPress plugin by CVE, issue type, severity, and patch status so operators and search engines can connect the full vulnerability cluster.
Advanced Access Manager <= 5.9.8.1 - Unauthenticated Arbitrary File Read
Advanced Access Manager <= 6.6.1 - Authenticated Authorization Bypass and Privilege Escalation
Advanced Access Manager <= 2.8.2 - Arbitrary File Overwrite
Advanced Access Manager <= 6.9.18 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Advanced Access Manager <= 6.9.15 - Authenticated (Contributor+) Stored Cross-Site Scripting
Advanced Access Manager <= 6.9.20 - Reflected Cross-Site Scripting
Advanced Access Manager <= 6.9.20 - Authenticated (Administrator+) Stored Cross-Site Scripting
Advanced Access Manager <= 6.7.9 - Admin+ Stored Cross-Site Scripting
This record contains material that is subject to copyright
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more
License: CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for such purposes is authorized provided that you reproduce MITRE's copyright designation and this license in any such copy. Read more