The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.13.7. This is due to the pms_pb_payment_redirect_link function using the user-controlled value supplied via the 'pms_payment_id' parameter to authenticate users without any further identity validation. This makes it possible for unauthenticated attackers with knowledge of a valid payment ID to log in as any user who has made a purchase on the targeted site.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Jan 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cozmoslabs
Cozmoslabs membership \& Content Restriction - Paid Member Subscriptions |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:cozmoslabs:membership_\&_content_restriction_-_paid_member_subscriptions:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Cozmoslabs
Cozmoslabs membership \& Content Restriction - Paid Member Subscriptions |
Tue, 14 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 14 Jan 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.13.7. This is due to the pms_pb_payment_redirect_link function using the user-controlled value supplied via the 'pms_payment_id' parameter to authenticate users without any further identity validation. This makes it possible for unauthenticated attackers with knowledge of a valid payment ID to log in as any user who has made a purchase on the targeted site. | |
Title | Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction <= 2.13.7 - Authentication Bypass via pms_payment_id | |
Weaknesses | CWE-287 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-01-14T14:43:35.557Z
Reserved: 2024-12-24T17:14:52.449Z
Link: CVE-2024-12919

Updated: 2025-01-14T14:43:30.729Z

Status : Analyzed
Published: 2025-01-14T10:15:07.250
Modified: 2025-01-22T17:29:01.883
Link: CVE-2024-12919

No data.