- ITDM 2025 전망 | 금융 플랫폼 성패, 지속가능한 사업 가치 창출에 달렸다” KB국민카드 이호준 그룹장
- “고객경험 개선하고 비용은 절감, AI 기반까지 마련” · · · AIA생명의 CCM 프로젝트 사례
- 2025年、CIOはAIに意欲的に投資する - そしてその先も
- The best robot vacuums for pet hair of 2024: Expert tested and reviewed
- These Sony headphones eased my XM5 envy with all-day comfort and plenty of bass
Simple Membership Plugin Flaws Expose WordPress Sites
Two new security flaws in the popular Simple Membership plugin for WordPress, affecting versions 4.3.4 and below, have been identified, leading to potential privilege escalation issues.
With over 50,000 active installations, the plugin developed by smp7 and wp.insider is widely used for custom membership management on WordPress sites.
The flaws identified by Patchstack security researchers include an Unauthenticated Membership Role Privilege Escalation vulnerability (CVE-2023-41957) and an Authenticated Account Takeover vulnerability (CVE-2023-41956).
In the former, unauthenticated users could register accounts with arbitrary membership levels, while the latter allowed authenticated users to take over any member account through an insecure password reset process.
The Unauthenticated Membership Role Privilege Escalation vulnerability primarily hinges on a function that handles the registration process.
“The function handles the process of password reset through a reset password link feature. In the plugin context, the user can enable password reset through a link that will be sent to the user’s email,” Patchstack wrote in an advisory published earlier today.
A critical condition exists when the function can be manipulated through some GET parameters, enabling users to register with any membership level from an arbitrary member account.
In the Authenticated Account Takeover vulnerability, a separate function handles password reset through a link feature. By carefully crafting the parameters, an attacker could exploit this vulnerability to take control of a user’s account.
According to the Patchstack advisory, the plugin vendor responded swiftly after Patchstack reported the vulnerability on August 29.
“For the first vulnerability, the vendor decided to check if the SQL query to update the member information via the code parameter is valid. This code value could only be obtained by users that already completed their payment or process on a paid membership level,” Patchstack wrote.
“For the second vulnerability, the vendor decided to match the login parameter used for the reset password key check and the actual user object on the $user_data variable.”
The vendor released version 4.3.5 on August 30 2023 to patch these issues, implementing checks to validate user-controlled parameters in custom registration and password reset processes.