CVE-2025-11835: CWE-862 Missing Authorization in cozmoslabs Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction
The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability and validation check on the PMS_AJAX_Checkout_Handler::process_payment() function in all versions up to, and including, 2.16.4. This makes it possible for unauthenticated attackers to trigger stored auto-renew charges for arbitrary members.
AI Analysis
Technical Summary
CVE-2025-11835 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WordPress plugin 'Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction' developed by cozmoslabs. The issue exists in the PMS_AJAX_Checkout_Handler::process_payment() function, which lacks proper capability and validation checks. This flaw allows unauthenticated attackers to invoke the function and trigger stored auto-renew charges on behalf of arbitrary members without authorization. The vulnerability affects all plugin versions up to and including 2.16.4. Because the process_payment function handles critical payment operations, unauthorized triggering can lead to manipulation of billing processes, potentially charging members without their consent or causing financial discrepancies. The CVSS v3.1 score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. No patches are currently linked, and no known exploits have been reported in the wild, but the vulnerability's presence in a widely used WordPress plugin poses a significant risk to sites relying on it for membership and payment management.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized financial transactions, causing direct monetary loss and undermining customer trust. Membership-based businesses, subscription services, and content providers using this plugin may experience fraudulent charges or billing errors, resulting in customer complaints, chargebacks, and reputational damage. The integrity of payment data is compromised, which could also lead to regulatory scrutiny under GDPR if customer financial data is mishandled or if unauthorized transactions occur. Additionally, organizations may face operational disruptions as they investigate and remediate the issue. The lack of authentication requirement increases the risk of automated exploitation attempts from remote attackers, potentially affecting a large number of sites. The vulnerability does not impact confidentiality or availability directly but can indirectly affect business continuity and customer relations.
Mitigation Recommendations
Organizations should monitor for plugin updates from cozmoslabs and apply patches immediately once available. Until a patch is released, administrators should restrict access to the payment processing AJAX endpoints via web application firewalls (WAFs) or server-level access controls to block unauthenticated requests. Implementing additional logging and anomaly detection on payment transactions can help identify unauthorized charges early. Consider temporarily disabling auto-renewal features or switching to alternative membership management plugins with verified security. Regularly audit membership and payment records for irregularities. Educate site administrators on the risks and ensure WordPress core and all plugins are kept up to date. Employ security plugins that can detect and block unauthorized AJAX calls. Finally, review and tighten user roles and capabilities within WordPress to minimize exposure.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-11835: CWE-862 Missing Authorization in cozmoslabs Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction
Description
The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability and validation check on the PMS_AJAX_Checkout_Handler::process_payment() function in all versions up to, and including, 2.16.4. This makes it possible for unauthenticated attackers to trigger stored auto-renew charges for arbitrary members.
AI-Powered Analysis
Technical Analysis
CVE-2025-11835 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WordPress plugin 'Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction' developed by cozmoslabs. The issue exists in the PMS_AJAX_Checkout_Handler::process_payment() function, which lacks proper capability and validation checks. This flaw allows unauthenticated attackers to invoke the function and trigger stored auto-renew charges on behalf of arbitrary members without authorization. The vulnerability affects all plugin versions up to and including 2.16.4. Because the process_payment function handles critical payment operations, unauthorized triggering can lead to manipulation of billing processes, potentially charging members without their consent or causing financial discrepancies. The CVSS v3.1 score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. No patches are currently linked, and no known exploits have been reported in the wild, but the vulnerability's presence in a widely used WordPress plugin poses a significant risk to sites relying on it for membership and payment management.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized financial transactions, causing direct monetary loss and undermining customer trust. Membership-based businesses, subscription services, and content providers using this plugin may experience fraudulent charges or billing errors, resulting in customer complaints, chargebacks, and reputational damage. The integrity of payment data is compromised, which could also lead to regulatory scrutiny under GDPR if customer financial data is mishandled or if unauthorized transactions occur. Additionally, organizations may face operational disruptions as they investigate and remediate the issue. The lack of authentication requirement increases the risk of automated exploitation attempts from remote attackers, potentially affecting a large number of sites. The vulnerability does not impact confidentiality or availability directly but can indirectly affect business continuity and customer relations.
Mitigation Recommendations
Organizations should monitor for plugin updates from cozmoslabs and apply patches immediately once available. Until a patch is released, administrators should restrict access to the payment processing AJAX endpoints via web application firewalls (WAFs) or server-level access controls to block unauthenticated requests. Implementing additional logging and anomaly detection on payment transactions can help identify unauthorized charges early. Consider temporarily disabling auto-renewal features or switching to alternative membership management plugins with verified security. Regularly audit membership and payment records for irregularities. Educate site administrators on the risks and ensure WordPress core and all plugins are kept up to date. Employ security plugins that can detect and block unauthorized AJAX calls. Finally, review and tighten user roles and capabilities within WordPress to minimize exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-15T21:48:26.282Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690ac97016b8dcb1e3eaa161
Added to database: 11/5/2025, 3:50:08 AM
Last enriched: 11/5/2025, 4:01:04 AM
Last updated: 11/5/2025, 7:22:40 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12388: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Carousel Block – Responsive Image and Content Carousel
MediumCVE-2025-12384: CWE-862 Missing Authorization in bplugins Document Embedder – Embed PDFs, Word, Excel, and Other Files
HighCVE-2025-12139: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in princeahmed File Manager for Google Drive – Integrate Google Drive
HighCVE-2025-11917: CWE-918 Server-Side Request Forgery (SSRF) in etruel WPeMatico RSS Feed Fetcher
MediumCVE-2025-11373: CWE-862 Missing Authorization in averta Popup and Slider Builder by Depicter – Add Email collecting Popup, Popup Modal, Coupon Popup, Image Slider, Carousel Slider, Post Slider Carousel
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.