First published: Sat Feb 15 2025(Updated: )
The s2Member Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 241216 via deserialization of untrusted input from the 's2member_pro_remote_op' vulnerable parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
s2Member | <=241216 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12562 is considered a high severity vulnerability due to the potential for PHP Object Injection allowing unauthenticated attackers to exploit the flaw.
To fix CVE-2024-12562, update the s2Member Pro plugin to the latest version beyond 241216.
CVE-2024-12562 affects all versions of the s2Member Pro plugin for WordPress up to and including version 241216.
CVE-2024-12562 can be exploited via PHP Object Injection, which may allow attackers to execute arbitrary PHP code.
No, the exploitation of CVE-2024-12562 does not require authentication, making it particularly dangerous.