Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3215: CWE-352 Cross-Site Request Forgery (CSRF) in strangerstudios Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions

0
Medium
VulnerabilityCVE-2024-3215cvecve-2024-3215cwe-352
Published: Thu May 02 2024 (05/02/2024, 16:52:29 UTC)
Source: CVE Database V5
Vendor/Project: strangerstudios
Product: Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions

Description

CVE-2024-3215 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Paid Memberships Pro WordPress plugin up to version 3. 0. 1. The flaw arises from missing or incorrect nonce validation in the pmpro_update_level_group_order() function, allowing unauthenticated attackers to manipulate membership order levels by tricking an administrator into clicking a malicious link. This vulnerability does not impact confidentiality or availability but can alter the integrity of membership data. Exploitation requires no authentication but does require user interaction from an administrator. The CVSS score is 5. 3, indicating a medium severity level. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or implementing nonce validation to prevent unauthorized membership modifications.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:06:52 UTC

Technical Analysis

The Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions plugin for WordPress suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2024-3215. This vulnerability exists in all versions up to and including 3.0.1 due to missing or incorrect nonce validation in the pmpro_update_level_group_order() function. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not forged sources. The absence or improper implementation of nonce checks allows an attacker to craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a crafted webpage), can update membership order levels without authorization. This can lead to unauthorized changes in membership privileges or subscription statuses. The vulnerability does not expose sensitive data (no confidentiality impact) nor does it cause denial of service (no availability impact), but it compromises data integrity by allowing unauthorized modifications. The attack vector is network-based (remote), requires no privileges or authentication, but does require user interaction from an administrator. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the moderate risk posed by this vulnerability. Currently, there are no known exploits in the wild, but the risk remains significant for sites using this plugin without proper nonce validation or patches.

Potential Impact

The primary impact of CVE-2024-3215 is the unauthorized modification of membership order levels within affected WordPress sites using the Paid Memberships Pro plugin. This can lead to privilege escalation scenarios where attackers can grant themselves or others higher membership levels or alter subscription statuses, potentially bypassing payment or access controls. For organizations relying on this plugin for paid subscriptions or content restriction, this undermines business models and revenue streams. Additionally, unauthorized membership changes can disrupt user management workflows and cause reputational damage if customers are affected. While the vulnerability does not directly expose sensitive data or cause service outages, the integrity compromise can facilitate further attacks or fraud. The requirement for administrator interaction limits the attack scope but does not eliminate risk, especially in environments where administrators may be targeted via phishing or social engineering. Globally, organizations running WordPress sites with this plugin are at risk, particularly those with high-value subscription services or sensitive content gating.

Mitigation Recommendations

To mitigate CVE-2024-3215, organizations should immediately update the Paid Memberships Pro plugin to a version that includes proper nonce validation in the pmpro_update_level_group_order() function once available. Until a patch is released, administrators should be trained to avoid clicking on suspicious links and to verify the legitimacy of requests related to membership management. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block CSRF attack patterns targeting this function can reduce risk. Additionally, site owners can manually add nonce verification to the vulnerable function by modifying plugin code to include WordPress nonce checks (using wp_verify_nonce) before processing requests. Restricting administrator access to trusted networks and enforcing multi-factor authentication (MFA) can further reduce the likelihood of successful exploitation. Regular monitoring of membership changes and audit logs can help detect unauthorized modifications early. Finally, educating administrators about CSRF risks and social engineering tactics is critical to prevent inadvertent exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-02T17:36:53.860Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c8eb7ef31ef0b56638f

Added to database: 2/25/2026, 9:41:34 PM

Last enriched: 2/26/2026, 6:06:52 AM

Last updated: 2/26/2026, 8:06:07 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats