First published: Fri Oct 20 2023(Updated: )
The ARMember Lite - Membership Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 4.0.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Repute Infosystems ARMember – Membership Plugin | <=4.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-3996.
The severity of CVE-2023-3996 is medium with a CVSS score of 4.4.
The affected software of CVE-2023-3996 is the ARMember Lite - Membership Plugin for WordPress up to and including version 4.0.14.
CVE-2023-3996 exploits the vulnerability through stored cross-site scripting (XSS) via admin settings in the ARMember Lite - Membership Plugin for WordPress.
Yes, it is recommended to update the ARMember Lite - Membership Plugin for WordPress to version 4.0.15 or later to fix the vulnerability.