
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical security vulnerability (CVE-2024-12562) has been discovered in the s2Member Pro plugin for WordPress, affecting all versions up to and including 241216. The vulnerability has been assigned a CVSS score of 9.8, indicating its critical severity. This PHP Object Injection vulnerability affects the widely-used membership plugin that has over 1.6 million downloads (Security Online).
The vulnerability stems from the plugin's failure to properly sanitize user input, specifically in the s2member_pro_remote_op parameter. This allows unauthenticated attackers to perform PHP Object Injection attacks. The issue was discovered and reported by István Márton at Wordfence (Security Online).
While the vulnerability itself does not directly provide attackers with code execution capabilities, it can be chained with other vulnerabilities present in themes or plugins installed on the target website. This could potentially lead to arbitrary file deletion, sensitive data theft, and remote code execution (Security Online).
The s2Member development team has released a patch in version 250214. Website owners using s2Member Pro are strongly advised to update their plugin immediately to the latest version to mitigate the risk of exploitation (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."