CVE-2024-12562
Published: 15 February 2025
Description
The s2Member Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 241216 via deserialization of untrusted input from the 's2member_pro_remote_op' vulnerable parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Security Summary
CVE-2024-12562 is a PHP Object Injection vulnerability (CWE-502) in the s2Member Pro plugin for WordPress, affecting all versions up to and including 241216. The issue stems from deserialization of untrusted input passed through the 's2member_pro_remote_op' parameter, allowing attackers to inject arbitrary PHP objects.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required, as reflected in its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Although no known Proof-of-POP (Property-Oriented Programming) chain exists within the vulnerable s2Member Pro software itself, the injection could be leveraged for severe impacts if a POP chain is available via other installed plugins or themes, potentially enabling arbitrary file deletion, sensitive data retrieval, or remote code execution.
Advisories and patch information are detailed in the s2Member changelog at https://s2member.com/changelog/ and Wordfence threat intelligence at https://www.wordfence.com/threat-intel/vulnerabilities/id/65192fdb-86db-475a-8c61-4db922920cfe?source=cve.
Details
- CWE(s)