The s2Member Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 241216 via deserialization of untrusted input from the 's2member_pro_remote_op' vulnerable parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Feb 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
S2member
S2member s2member |
|
CPEs | cpe:2.3:a:s2member:s2member:*:*:*:*:pro:wordpress:*:* | |
Vendors & Products |
S2member
S2member s2member |
Tue, 18 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 15 Feb 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The s2Member Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 241216 via deserialization of untrusted input from the 's2member_pro_remote_op' vulnerable parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | |
Title | s2Member Pro <= 241216 - Unauthenticated PHP Object Injection | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-18T21:23:54.081Z
Reserved: 2024-12-12T05:54:55.950Z
Link: CVE-2024-12562

Updated: 2025-02-18T21:23:49.371Z

Status : Analyzed
Published: 2025-02-15T10:15:08.197
Modified: 2025-02-24T12:27:50.967
Link: CVE-2024-12562

No data.