First published: Wed Jul 12 2023(Updated: )
The ARMember plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.0.5. This is due to missing or incorrect nonce validation on the arm_check_user_cap function. This makes it possible for unauthenticated attackers to perform multiple unauthorized actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Repute Infosystems ARMember – Membership Plugin | <4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3011 is a vulnerability in the ARMember plugin for WordPress that allows unauthenticated attackers to perform unauthorized actions.
CVE-2023-3011 has a severity rating of 8.8, which is considered high.
CVE-2023-3011 affects ARMember plugin versions up to and including 4.0.5.
There is currently no official fix for CVE-2023-3011. It is recommended to update to the latest version of the ARMember plugin when a fix becomes available.
You can find more information about CVE-2023-3011 at the following references: [link1], [link2].