Vulnerability Description
The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.13.7. This is due to the pms_pb_payment_redirect_link function using the user-controlled value supplied via the 'pms_payment_id' parameter to authenticate users without any further identity validation. This makes it possible for unauthenticated attackers with knowledge of a valid payment ID to log in as any user who has made a purchase on the targeted site.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cozmoslabs | Membership \& Content Restriction - Paid Member Subscriptions | < 2.13.8 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/3214706/paid-member-subscriptionsPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d3a4fa4d-a7d2-4890-b0fThird Party Advisory
FAQ
What is CVE-2024-12919?
CVE-2024-12919 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2...
How severe is CVE-2024-12919?
CVE-2024-12919 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-12919?
Check the references section above for vendor advisories and patch information. Affected products include: Cozmoslabs Membership \& Content Restriction - Paid Member Subscriptions.