Cyber Posture

CVE-2024-12919

Critical

Published: 14 January 2025

Published
14 January 2025
Modified
22 January 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 29.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.13.7. This is due to the pms_pb_payment_redirect_link function using the user-controlled value supplied via the 'pms_payment_id' parameter to authenticate users without any further identity validation. This makes it possible for unauthenticated attackers with knowledge of a valid payment ID to log in as any user who has made a purchase on the targeted site.

Security Summary

CVE-2024-12919 is an authentication bypass vulnerability in the Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress, affecting all versions up to and including 2.13.7. The flaw occurs in the pms_pb_payment_redirect_link function, which authenticates users based solely on a user-controlled value from the 'pms_payment_id' parameter without performing any further identity validation.

Unauthenticated attackers with knowledge of a valid payment ID can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation allows them to log in as any user who has made a purchase on the targeted site, potentially granting access to sensitive data and privileged actions. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-287 (Improper Authentication).

Mitigation details are provided in the plugin's WordPress trac changeset 3214706 at https://plugins.trac.wordpress.org/changeset/3214706/paid-member-subscriptions, which includes the patch. Additional threat intelligence is available from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/d3a4fa4d-a7d2-4890-b0f5-5fe69bc5e7ac?source=cve. Security practitioners should update to a patched version beyond 2.13.7 immediately.

Details

CWE(s)
CWE-287NVD-CWE-Other

Affected Products

cozmoslabs
membership \& content restriction - paid member subscriptions
≤ 2.13.8

References