First published: Wed May 22 2024(Updated: )
The Memberpress plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 1.11.29 via the 'mepr-user-file' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
MemberPress | <=1.11.29 | |
MemberPress | <1.11.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5031 has been classified as a security vulnerability that allows authenticated attackers to perform Blind Server-Side Request Forgery.
To fix CVE-2024-5031, update the MemberPress plugin to version 1.11.30 or later.
CVE-2024-5031 affects users of MemberPress versions up to and including 1.11.29 who have Contributor-level access or higher.
CVE-2024-5031 facilitates Blind Server-Side Request Forgery attacks, allowing attackers to make unauthorized web requests.
While the best mitigation is to update the plugin, temporarily restricting access to the 'mepr-user-file' shortcode can help minimize risk until an update is applied.