vendor:
Paid Memberships Pro
by:
r3nt0n
9.8
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Paid Memberships Pro
Affected Version From: < 2.9.8
Affected Version To: 2.9.2007
Patch Exists: YES
Related CWE: CVE-2023-23488
CPE: a:paidmembershipspro:paid_memberships_pro:2.9.7
Tags: paid-memberships-pro,cve2023,wordpress,tenable,packetstorm,wp-plugin,sqli,cve,wp
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei Metadata: {'max-request': 2, 'verified': True, 'framework': 'wordpress', 'vendor': 'strangerstudios', 'product': 'paid_memberships_pro'}
Platforms Tested: Debian 11, WordPress 6.1.1
2023
Paid Memberships Pro v2.9.8 (WordPress Plugin) – Unauthenticated SQL Injection
Paid Memberships Pro is a WordPress plugin that is vulnerable to an unauthenticated SQL injection vulnerability. This vulnerability allows an attacker to execute arbitrary SQL commands on the target database. The vulnerability was discovered by Joshua Martinelle and was assigned CVE-2023-23488. The exploit can be tested by running a script against a WordPress instance with the Paid Membership Pro plugin. The script will tell if the target is vulnerable and generate an appropriate sqlmap command to dump the whole database or specific data like usernames and passwords.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should update to the latest version of the plugin.