First published: Wed Apr 05 2023(Updated: )
The WCFM Membership plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.9.10 due to missing nonce checks on various AJAX actions. This makes it possible for unauthenticated attackers to perform a wide variety of actions such as modifying membership details, changing renewal information, controlling membership approvals, and more, via a forged request granted they can trick a site's administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wclovers Wcfm Membership | <2.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4941 is a vulnerability in the WCFM Membership plugin for WordPress that allows unauthenticated attackers to perform various actions due to missing nonce checks on AJAX actions.
The severity of CVE-2022-4941 is high with a CVSS score of 8.8.
Versions up to, and including, 2.9.10 of the WCFM Membership plugin for WordPress are affected by CVE-2022-4941.
An attacker can exploit CVE-2022-4941 by performing Cross-Site Request Forgery attacks to modify membership details or perform other unauthorized actions.
Yes, you can find references for CVE-2022-4941 at the following links: [Link 1](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2605020%40wc-multivendor-membership&new=2605020%40wc-multivendor-membership&sfp_email=&sfph_mail=), [Link 2](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2632641%40wc-multivendor-membership&new=2632641%40wc-multivendor-membership&sfp_email=&sfph_mail=), [Link 3](https://www.wordfence.com/threat-intel/vulnerabilities/id/3758db41-a3c5-436a-bb9a-5886f10d1519?source=cve)