First published: Wed Jun 19 2024(Updated: )
The Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.12.10. This is due to missing or incorrect nonce validation on multiple functions. This makes it possible for unauthenticated attackers to subscribe to, modify, or cancel membership for a user via a forged request granted they can trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
<3.0 |
https://plugins.trac.wordpress.org/browser/paid-memberships-pro/tags/2.12.10/includes/functions.php
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1407 is categorized as a Cross-Site Request Forgery vulnerability with a medium severity level.
To fix CVE-2024-1407, update the Paid Memberships Pro plugin to version 2.12.11 or higher.
All versions of the Paid Memberships Pro plugin up to and including 2.12.10 are affected by CVE-2024-1407.
CVE-2024-1407 can be exploited by an attacker to perform unauthorized actions on behalf of an authenticated user.
Yes, CVE-2024-1407 is due to missing or incorrect nonce validation, affecting user input validation.