Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1389: CWE-862 Missing Authorization in iovamihai Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction

0
Medium
VulnerabilityCVE-2024-1389cvecve-2024-1389cwe-862
Published: Tue Feb 20 2024 (02/20/2024, 18:56:46 UTC)
Source: CVE
Vendor/Project: iovamihai
Product: Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction

Description

The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pms_stripe_connect_handle_authorization_return function in all versions up to, and including, 2.11.1. This makes it possible for unauthenticated attackers to change the Stripe payment keys.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 08:24:36 UTC

Technical Analysis

CVE-2024-1389 identifies a missing authorization vulnerability (CWE-862) in the WordPress plugin 'Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction' developed by iovamihai. The vulnerability exists in the function pms_stripe_connect_handle_authorization_return, which handles Stripe payment authorization returns. Due to the absence of proper capability checks, unauthenticated attackers can invoke this function to alter Stripe payment keys configured within the plugin. Since Stripe keys are critical for processing recurring payments and managing membership subscriptions, unauthorized modification can lead to redirecting payments to attacker-controlled accounts or disrupting payment flows. The vulnerability affects all plugin versions up to and including 2.11.1. Exploitation requires no authentication or user interaction and can be performed remotely over the network. The CVSS v3.1 base score is 5.3 (medium), with the vector indicating network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to integrity, as confidentiality and availability are not directly affected. No public exploits or active exploitation have been reported to date. The vulnerability was reserved and published in February 2024, with enrichment from CISA. Given the widespread use of WordPress and the popularity of this plugin for managing paid memberships and recurring payments, this vulnerability poses a moderate risk to affected sites, especially those relying on Stripe for payment processing.

Potential Impact

The primary impact of CVE-2024-1389 is unauthorized modification of Stripe payment keys within the affected plugin. This can lead to attackers redirecting payments to their own Stripe accounts, resulting in financial fraud and loss of revenue for organizations. Additionally, altering payment keys can disrupt legitimate payment processing, causing denial of service for subscription-based services and damaging customer trust. Although confidentiality and availability are not directly impacted, the integrity compromise can have significant financial and reputational consequences. Organizations relying on this plugin for membership and recurring payments are at risk of fraud and operational disruption. The vulnerability's ease of exploitation (no authentication or user interaction required) increases the likelihood of automated attacks targeting vulnerable WordPress sites. However, the absence of known exploits in the wild suggests limited active exploitation currently. Nonetheless, the potential for financial loss and service disruption makes this a significant concern for e-commerce, membership, and subscription-based businesses worldwide.

Mitigation Recommendations

1. Immediate update: Organizations should upgrade the Paid Membership Subscriptions plugin to a version where this vulnerability is patched once available. Monitor vendor announcements for official patches. 2. Temporary access restrictions: Until patched, restrict access to the affected function by implementing web application firewall (WAF) rules that block unauthorized requests targeting the pms_stripe_connect_handle_authorization_return endpoint or related URLs. 3. Stripe key rotation: Rotate Stripe API keys used in the plugin to invalidate any potentially compromised keys. 4. Monitor logs: Enable detailed logging and monitor for suspicious requests or changes to payment configuration parameters. 5. Principle of least privilege: Review and tighten WordPress user roles and capabilities to minimize exposure. 6. Harden WordPress security: Employ security best practices such as limiting plugin installations, disabling unused endpoints, and enforcing strong authentication for admin users. 7. Incident response readiness: Prepare to respond to potential fraud or payment disruptions by coordinating with payment processors and legal teams. 8. Backup and recovery: Maintain regular backups of WordPress configurations and databases to enable quick restoration if needed. These steps go beyond generic advice by focusing on immediate containment, key rotation, and proactive monitoring specific to this vulnerability's nature.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-02-08T22:06:28.929Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1094

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 2/28/2026, 8:24:36 AM

Last updated: 3/25/2026, 9:24:47 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses