9.8
CVE-2024-12919
- EPSS 0.11%
- Veröffentlicht 14.01.2025 10:15:07
- Zuletzt bearbeitet 22.01.2025 17:29:01
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction <= 2.13.7 - Authentication Bypass via pms_payment_id
The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.13.7. This is due to the pms_pb_payment_redirect_link function using the user-controlled value supplied via the 'pms_payment_id' parameter to authenticate users without any further identity validation. This makes it possible for unauthenticated attackers with knowledge of a valid payment ID to log in as any user who has made a purchase on the targeted site.
Mögliche Gegenmaßnahme
Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction: Update to version 2.13.8, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction
Version
*-2.13.7
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cozmoslabs ≫ Membership & Content Restriction - Paid Member Subscriptions SwPlatformwordpress Version < 2.13.8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.11% | 0.302 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.