vulnerability
WordPress Plugin: advanced-access-manager: CVE-2020-35934: Exposure of Sensitive Information to an Unauthorized Actor
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | Aug 20, 2020 | May 15, 2025 | Apr 30, 2026 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Aug 20, 2020
Added
May 15, 2025
Modified
Apr 30, 2026
Description
The Advanced Access Manager plugin before 6.6.2 for WordPress displays the unfiltered user object (including all metadata) upon login via the REST API (aam/v1/authenticate or aam/v2/authenticate). This is a security problem if this object stores information that the user is not supposed to have (e.g., custom metadata added by a different plugin).
Solution
advanced-access-manager-plugin-cve-2020-35934
References
- https://www.cve.org/CVERecord?id=CVE-2020-35934
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d1c9da9c-8a92-44fd-a35a-4c6d3777901f?source=api-prod
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2020-23517
- CVE-2020-35934
- https://attackerkb.com/topics/CVE-2020-35934
- CWE-200
- EUVD-EUVD-2020-23517
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.