First published: Sat Nov 18 2023(Updated: )
The Paid Memberships Pro plugin for WordPress is vulnerable to arbitrary file uploads to insufficient file type validation in the 'pmpro_paypalexpress_session_vars_for_user_fields' function in versions up to, and including, 2.12.3. This makes it possible for authenticated attackers with subscriber privileges or above, to upload arbitrary files on the affected site's server which may make remote code execution possible. This can be exploited if 2Checkout (deprecated since version 2.6) or PayPal Express is set as the payment method and a custom user field is added that is only visible at profile, and not visible at checkout according to its settings.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Strangerstudios Paid Memberships Pro | <=2.12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6187 is a vulnerability in the Paid Memberships Pro plugin for WordPress that allows authenticated attackers to upload arbitrary files due to insufficient file type validation.
CVE-2023-6187 affects versions up to and including 2.12.3 of the Paid Memberships Pro plugin for WordPress.
CVE-2023-6187 has a severity rating of 8.8 (high).
Authenticated attackers with subscriber privileges can exploit CVE-2023-6187 by uploading arbitrary files to the 'pmpro_paypalexpress_session_vars_for_user_fields' function.
Yes, a fix for CVE-2023-6187 is available in Paid Memberships Pro plugin version 2.12.4.