PHP Object Injection Vulnerability in s2Member Pro Plugin for WordPress
CVE-2024-12562

9.8CRITICAL

Key Information:

Vendor
WordPress
Vendor
CVE Published:
15 February 2025

What is CVE-2024-12562?

CVE-2024-12562 is a vulnerability affecting the s2Member Pro plugin for WordPress, developed by WP Sharks. This plugin is widely used to manage member subscriptions and access control in WordPress sites. The vulnerability arises from a PHP Object Injection flaw that allows unauthenticated attackers to exploit the deserialization of untrusted input. If successfully exploited, this can have severe consequences for organizations using the plugin, as it may lead to unauthorized access and manipulation of sensitive data and system resources.

Technical Details

The vulnerability exists in versions of the s2Member Pro plugin up to 241216. It specifically involves the 's2member_pro_remote_op' parameter, which is susceptible to PHP Object Injection due to insecure deserialization practices. Attackers can craft a malicious request to trigger the vulnerability and inject a PHP object into the application. Although there is currently no known Proof of Concept (PoC) chain associated with this vulnerability in the software itself, the potential for exploitation increases if additional plugins or themes that include such a chain are present on the system.

Potential Impact of CVE-2024-12562

  1. Unauthorized File Operations: If an attacker successfully exploits this vulnerability, they may gain the ability to delete arbitrary files from the affected system. This could compromise critical application files or data, severely disrupting operations and leading to potential data loss.

  2. Sensitive Data Exposure: The injection of a PHP object can grant attackers access to sensitive data stored within the WordPress database or files, including user credentials and personal information. This data breach can have severe consequences for users and organizations, including regulatory penalties and reputational damage.

  3. Remote Code Execution: In scenarios where a Proof of Concept chain exists through other plugins or themes, attackers might execute arbitrary code on the server. This capability can lead to full control over the affected system, allowing the installation of malware, launching further attacks, and potentially compromising additional systems within the organization’s network.

Affected Version(s)

s2Member Pro * <= 241216

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

István Márton
.