Vulnerabilities (CVE)

Filtered by vendor Wclovers Subscribe
Filtered by product Wcfm Membership
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-2276 1 Wclovers 1 Wcfm Membership 2024-11-21 N/A 9.8 CRITICAL
The WCFM Membership – WooCommerce Memberships for Multivendor Marketplace plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 2.10.7. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts.
CVE-2022-4941 1 Wclovers 1 Wcfm Membership 2024-11-21 N/A 6.3 MEDIUM
The WCFM Membership plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.9.10 due to missing nonce checks on various AJAX actions. This makes it possible for unauthenticated attackers to perform a wide variety of actions such as modifying membership details, changing renewal information, controlling membership approvals, and more, via a forged request granted they can trick a site's administrator into performing an action such as clicking on a link.
CVE-2022-4940 1 Wclovers 1 Wcfm Membership 2024-11-21 N/A 7.3 HIGH
The WCFM Membership plugin for WordPress is vulnerable to unauthorized modification and access of data in versions up to, and including, 2.10.0 due to missing capability checks on various AJAX actions. This makes it possible for unauthenticated attackers to perform a wide variety of actions such as modifying membership details, changing renewal information, controlling membership approvals, and more.
CVE-2022-4939 1 Wclovers 1 Wcfm Membership 2024-11-21 N/A 9.8 CRITICAL
THe WCFM Membership plugin for WordPress is vulnerable to privilege escalation in versions up to, and including 2.10.0, due to a missing capability check on the wp_ajax_nopriv_wcfm_ajax_controller AJAX action that controls membership settings. This makes it possible for unauthenticated attackers to modify the membership registration form in a way that allows them to set the role for registration to that of any user including administrators. Once configured, the attacker can then register as an administrator.