Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11835: CWE-862 Missing Authorization in cozmoslabs Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction

0
Medium
VulnerabilityCVE-2025-11835cvecve-2025-11835cwe-862
Published: Wed Nov 05 2025 (11/05/2025, 03:27:57 UTC)
Source: CVE Database V5
Vendor/Project: cozmoslabs
Product: Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction

Description

The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability and validation check on the PMS_AJAX_Checkout_Handler::process_payment() function in all versions up to, and including, 2.16.4. This makes it possible for unauthenticated attackers to trigger stored auto-renew charges for arbitrary members.

AI-Powered Analysis

AILast updated: 11/05/2025, 04:01:04 UTC

Technical Analysis

CVE-2025-11835 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WordPress plugin 'Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction' developed by cozmoslabs. The issue exists in the PMS_AJAX_Checkout_Handler::process_payment() function, which lacks proper capability and validation checks. This flaw allows unauthenticated attackers to invoke the function and trigger stored auto-renew charges on behalf of arbitrary members without authorization. The vulnerability affects all plugin versions up to and including 2.16.4. Because the process_payment function handles critical payment operations, unauthorized triggering can lead to manipulation of billing processes, potentially charging members without their consent or causing financial discrepancies. The CVSS v3.1 score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. No patches are currently linked, and no known exploits have been reported in the wild, but the vulnerability's presence in a widely used WordPress plugin poses a significant risk to sites relying on it for membership and payment management.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized financial transactions, causing direct monetary loss and undermining customer trust. Membership-based businesses, subscription services, and content providers using this plugin may experience fraudulent charges or billing errors, resulting in customer complaints, chargebacks, and reputational damage. The integrity of payment data is compromised, which could also lead to regulatory scrutiny under GDPR if customer financial data is mishandled or if unauthorized transactions occur. Additionally, organizations may face operational disruptions as they investigate and remediate the issue. The lack of authentication requirement increases the risk of automated exploitation attempts from remote attackers, potentially affecting a large number of sites. The vulnerability does not impact confidentiality or availability directly but can indirectly affect business continuity and customer relations.

Mitigation Recommendations

Organizations should monitor for plugin updates from cozmoslabs and apply patches immediately once available. Until a patch is released, administrators should restrict access to the payment processing AJAX endpoints via web application firewalls (WAFs) or server-level access controls to block unauthenticated requests. Implementing additional logging and anomaly detection on payment transactions can help identify unauthorized charges early. Consider temporarily disabling auto-renewal features or switching to alternative membership management plugins with verified security. Regularly audit membership and payment records for irregularities. Educate site administrators on the risks and ensure WordPress core and all plugins are kept up to date. Employ security plugins that can detect and block unauthorized AJAX calls. Finally, review and tighten user roles and capabilities within WordPress to minimize exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-15T21:48:26.282Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690ac97016b8dcb1e3eaa161

Added to database: 11/5/2025, 3:50:08 AM

Last enriched: 11/5/2025, 4:01:04 AM

Last updated: 11/5/2025, 7:22:40 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats