CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Lifecycle Timeline
2DescriptionNVD
The YourMembership Single Sign On - YM SSO Login plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'moym_display_test_attributes' function in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to read the profile data of the latest SSO login.
AnalysisAI
Unauthenticated attackers can read sensitive profile data from the latest SSO login in the YourMembership Single Sign On (YM SSO Login) WordPress plugin through versions 1.1.7 due to a missing capability check on the 'moym_display_test_attributes' function. The vulnerability allows remote, unauthenticated access to confidential user information without any user interaction, presenting a direct information disclosure risk. No active exploitation has been confirmed at the time of analysis, though the low attack complexity and CVSS score of 5.3 indicate moderate real-world risk.
Technical ContextAI
The vulnerability stems from CWE-862 (Missing Authorization), a fundamental access control flaw in the YourMembership Single Sign On plugin for WordPress. The 'moym_display_test_attributes' function in the class-moym-sso.php file fails to implement WordPress capability checks before exposing sensitive user profile data. WordPress plugins typically use functions like current_user_can() to verify that only authenticated users with appropriate roles can access administrative or sensitive endpoints. The absence of such controls on what appears to be a test or debugging function leaves the endpoint accessible to any unauthenticated network attacker. The affected product is specifically the login-with-yourmembership plugin, which integrates YourMembership's SSO authentication system into WordPress environments, making it a critical access point for user authentication and profile data.
Affected ProductsAI
The YourMembership Single Sign On (YM SSO Login) WordPress plugin is vulnerable in all versions up to and including 1.1.7. The vulnerable code is located in the class-moym-sso.php file at the 'moym_display_test_attributes' function. No CPE string is provided in the input data, but WordPress plugin identification follows the pattern wp-plugin:login-with-yourmembership. Vendor advisory and patched version information can be accessed through the WordPress plugin repository changeset reference (https://plugins.trac.wordpress.org/changeset/3389623/) and the Wordfence vulnerability intelligence database (https://www.wordfence.com/threat-intel/vulnerabilities/id/1bb25412-8f63-4a9d-84bd-44fac59c6eed).
RemediationAI
Update the YourMembership Single Sign On plugin to the patched version released after 1.1.7 immediately. Review the WordPress plugin repository changeset 3389623 for deployment of the fix, which implements proper capability checks on the 'moym_display_test_attributes' function. Administrators should navigate to the WordPress dashboard, go to Plugins > Installed Plugins, locate 'Login with YourMembership,' and click 'Update Now' once a patched version is available. As an interim workaround pending patch availability, consider disabling the plugin or restricting access to WordPress administrative endpoints at the web server or firewall level. Verify the fix by confirming that unauthenticated requests to the vulnerable function no longer return sensitive profile data. Consult the Wordfence advisory (https://www.wordfence.com/threat-intel/vulnerabilities/id/1bb25412-8f63-4a9d-84bd-44fac59c6eed) for definitive patched version numbers and deployment guidance.
Share
External POC / Exploit Code
Leaving vuln.today