Stored Cross-Site Scripting Vulnerability in Paid Membership Plugin by WordPress
CVE-2024-13119
Key Information:
- Vendor
- WordPress
- Vendor
- CVE Published:
- 13 February 2025
Badges
Summary
The Paid Membership Plugin for WordPress, specifically versions prior to 4.15.20, has a critical issue where it fails to properly sanitize and escape certain configuration settings. This oversight enables high-privilege users, including administrators, to execute Stored Cross-Site Scripting attacks, even in scenarios where the unfiltered_html capability is restricted, such as in multisite environments. Attackers could leverage this vulnerability to inject malicious scripts that can be executed in the context of other users.
Affected Version(s)
Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content 0 < 4.15.20
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved