CVE-2025-10648: CWE-862 Missing Authorization in cyberlord92 YourMembership Single Sign On – YM SSO Login
The YourMembership Single Sign On – YM SSO Login plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'moym_display_test_attributes' function in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to read the profile data of the latest SSO login.
AI Analysis
Technical Summary
The YourMembership Single Sign On – YM SSO Login plugin for WordPress suffers from a missing authorization check vulnerability (CWE-862) identified as CVE-2025-10648. Specifically, the function 'moym_display_test_attributes' lacks a capability check, which means that any unauthenticated user can invoke this function and retrieve profile data related to the latest SSO login. This vulnerability affects all plugin versions up to and including 1.1.7. The vulnerability is remotely exploitable without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to confidentiality, allowing attackers to read profile data but not modify it or disrupt service availability. The CVSS score of 5.3 reflects a medium severity level. No patches or fixes have been released at the time of publication, and no known exploits are reported in the wild. The vulnerability could be leveraged to gather sensitive user information, potentially aiding further targeted attacks or social engineering. The plugin is used in WordPress environments that implement Single Sign On for membership management, making it a critical component in organizations relying on seamless user authentication and profile management.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of user profile data managed through the YourMembership SSO plugin. Such data leaks could compromise user privacy and violate data protection regulations like GDPR, leading to legal and reputational consequences. Organizations that rely on this plugin for membership authentication or user management may inadvertently expose sensitive user information to attackers. Although the vulnerability does not allow data modification or service disruption, the confidentiality breach can facilitate further attacks such as phishing or identity theft. The impact is particularly significant for sectors handling sensitive personal data, including education, non-profits, and membership-based services prevalent in Europe. The absence of authentication requirements and ease of exploitation increase the likelihood of opportunistic attacks. Additionally, the lack of patches means organizations must rely on interim mitigations until an official fix is available.
Mitigation Recommendations
1. Monitor the plugin vendor's official channels for security updates and apply patches immediately once released. 2. Implement web application firewall (WAF) rules to restrict access to the vulnerable function or plugin endpoints, blocking unauthenticated requests attempting to invoke 'moym_display_test_attributes'. 3. Restrict access to the WordPress admin and plugin-related URLs using IP whitelisting or VPN access where feasible. 4. Conduct regular audits of user profile data exposure and logs to detect any unauthorized access attempts. 5. Consider disabling or replacing the YourMembership SSO plugin temporarily if critical until a patch is available. 6. Educate administrators and users about the risk of phishing or social engineering that could leverage leaked profile data. 7. Review and tighten WordPress user roles and capabilities to minimize unnecessary exposure of sensitive functions. 8. Employ network segmentation to isolate WordPress servers hosting the plugin from sensitive internal systems. These measures provide layered defense beyond generic advice and address the specific nature of this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-10648: CWE-862 Missing Authorization in cyberlord92 YourMembership Single Sign On – YM SSO Login
Description
The YourMembership Single Sign On – YM SSO Login plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'moym_display_test_attributes' function in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to read the profile data of the latest SSO login.
AI-Powered Analysis
Technical Analysis
The YourMembership Single Sign On – YM SSO Login plugin for WordPress suffers from a missing authorization check vulnerability (CWE-862) identified as CVE-2025-10648. Specifically, the function 'moym_display_test_attributes' lacks a capability check, which means that any unauthenticated user can invoke this function and retrieve profile data related to the latest SSO login. This vulnerability affects all plugin versions up to and including 1.1.7. The vulnerability is remotely exploitable without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to confidentiality, allowing attackers to read profile data but not modify it or disrupt service availability. The CVSS score of 5.3 reflects a medium severity level. No patches or fixes have been released at the time of publication, and no known exploits are reported in the wild. The vulnerability could be leveraged to gather sensitive user information, potentially aiding further targeted attacks or social engineering. The plugin is used in WordPress environments that implement Single Sign On for membership management, making it a critical component in organizations relying on seamless user authentication and profile management.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of user profile data managed through the YourMembership SSO plugin. Such data leaks could compromise user privacy and violate data protection regulations like GDPR, leading to legal and reputational consequences. Organizations that rely on this plugin for membership authentication or user management may inadvertently expose sensitive user information to attackers. Although the vulnerability does not allow data modification or service disruption, the confidentiality breach can facilitate further attacks such as phishing or identity theft. The impact is particularly significant for sectors handling sensitive personal data, including education, non-profits, and membership-based services prevalent in Europe. The absence of authentication requirements and ease of exploitation increase the likelihood of opportunistic attacks. Additionally, the lack of patches means organizations must rely on interim mitigations until an official fix is available.
Mitigation Recommendations
1. Monitor the plugin vendor's official channels for security updates and apply patches immediately once released. 2. Implement web application firewall (WAF) rules to restrict access to the vulnerable function or plugin endpoints, blocking unauthenticated requests attempting to invoke 'moym_display_test_attributes'. 3. Restrict access to the WordPress admin and plugin-related URLs using IP whitelisting or VPN access where feasible. 4. Conduct regular audits of user profile data exposure and logs to detect any unauthorized access attempts. 5. Consider disabling or replacing the YourMembership SSO plugin temporarily if critical until a patch is available. 6. Educate administrators and users about the risk of phishing or social engineering that could leverage leaked profile data. 7. Review and tighten WordPress user roles and capabilities to minimize unnecessary exposure of sensitive functions. 8. Employ network segmentation to isolate WordPress servers hosting the plugin from sensitive internal systems. These measures provide layered defense beyond generic advice and address the specific nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-17T18:07:31.865Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ef5c7dc4f69c9730e569d3
Added to database: 10/15/2025, 8:34:05 AM
Last enriched: 10/15/2025, 8:54:32 AM
Last updated: 10/16/2025, 11:44:53 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-54859: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-54760: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.