CVE-2024-12919
Published: 14 January 2025
Description
The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.13.7. This is due to the pms_pb_payment_redirect_link function using the user-controlled value supplied via the 'pms_payment_id' parameter to authenticate users without any further identity validation. This makes it possible for unauthenticated attackers with knowledge of a valid payment ID to log in as any user who has made a purchase on the targeted site.
Security Summary
CVE-2024-12919 is an authentication bypass vulnerability in the Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress, affecting all versions up to and including 2.13.7. The flaw occurs in the pms_pb_payment_redirect_link function, which authenticates users based solely on a user-controlled value from the 'pms_payment_id' parameter without performing any further identity validation.
Unauthenticated attackers with knowledge of a valid payment ID can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation allows them to log in as any user who has made a purchase on the targeted site, potentially granting access to sensitive data and privileged actions. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-287 (Improper Authentication).
Mitigation details are provided in the plugin's WordPress trac changeset 3214706 at https://plugins.trac.wordpress.org/changeset/3214706/paid-member-subscriptions, which includes the patch. Additional threat intelligence is available from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/d3a4fa4d-a7d2-4890-b0f5-5fe69bc5e7ac?source=cve. Security practitioners should update to a patched version beyond 2.13.7 immediately.
Details
- CWE(s)