Skip to main content

CVE-2023-6855: CWE-862 Missing Authorization in strangerstudios Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions

Low
VulnerabilityCVE-2023-6855cvecve-2023-6855cwe-862
Published: Thu Jan 11 2024 (01/11/2024, 08:32:31 UTC)
Source: CVE Database V5
Vendor/Project: strangerstudios
Product: Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions

Description

The Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions plugin for WordPress is vulnerable to unauthorized modification of membership levels created by the plugin due to an incorrectly implemented capability check in the pmpro_rest_api_get_permissions_check function in all versions up to 2.12.5 (inclusive). This makes it possible for unauthenticated attackers to change membership levels including prices.

AI-Powered Analysis

AILast updated: 07/04/2025, 15:40:18 UTC

Technical Analysis

CVE-2023-6855 is a vulnerability identified in the WordPress plugin "Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions" developed by strangerstudios. This plugin is widely used to manage membership levels, content restriction, user registration, and paid subscriptions on WordPress sites. The vulnerability stems from an improper implementation of an authorization check within the function pmpro_rest_api_get_permissions_check. Specifically, the capability check that should restrict access to modifying membership levels is missing or incorrectly enforced. As a result, unauthenticated attackers can exploit this flaw to modify membership levels, including altering prices, without any authentication or user interaction. The vulnerability affects all versions up to and including 2.12.5. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with the vector showing that the attack can be performed remotely (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to integrity, as confidentiality and availability are not directly affected. No known exploits are currently reported in the wild, and no official patches have been linked yet. This vulnerability falls under CWE-862 (Missing Authorization), which highlights the risk of insufficient access control allowing unauthorized actions.

Potential Impact

For European organizations using the Paid Memberships Pro plugin on their WordPress sites, this vulnerability poses a risk to the integrity of their membership management systems. Attackers could manipulate membership levels, potentially granting unauthorized access to premium content or services without payment, or altering pricing structures to cause financial loss or reputational damage. This could lead to revenue loss, customer trust erosion, and compliance issues, especially under regulations like GDPR if personal data is indirectly affected through unauthorized membership changes. While the vulnerability does not directly compromise confidentiality or availability, the unauthorized modification of membership data can disrupt business operations and customer relationships. Organizations relying heavily on subscription-based models or membership-driven content in sectors such as media, education, or professional services in Europe should be particularly cautious. The lack of required authentication and user interaction makes exploitation easier, increasing the risk of automated or opportunistic attacks.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify if the Paid Memberships Pro plugin is in use and verify the version. Until an official patch is released, it is advisable to implement temporary access restrictions on the REST API endpoints related to membership management, for example by using web application firewalls (WAFs) or custom code to enforce strict authorization checks. Monitoring and logging REST API calls for suspicious activity can help detect exploitation attempts early. Organizations should also consider disabling or restricting the plugin’s REST API functionality if it is not essential. Regular backups of membership data should be maintained to enable recovery in case of unauthorized changes. Additionally, organizations should subscribe to vendor advisories and security mailing lists to promptly apply any forthcoming patches. For sites with high security requirements, consider isolating membership management functions or migrating to alternative plugins with stronger security postures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2023-12-15T17:01:59.388Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e6653

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 7/4/2025, 3:40:18 PM

Last updated: 7/31/2025, 6:54:13 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats