CVE-2025-10648

MEDIUM
2025-10-15 [email protected]
5.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 08, 2026 - 17:22 vuln.today
CVE Published
Oct 15, 2025 - 09:15 nvd
MEDIUM 5.3

DescriptionNVD

The YourMembership Single Sign On - YM SSO Login plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'moym_display_test_attributes' function in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to read the profile data of the latest SSO login.

AnalysisAI

Unauthenticated attackers can read sensitive profile data from the latest SSO login in the YourMembership Single Sign On (YM SSO Login) WordPress plugin through versions 1.1.7 due to a missing capability check on the 'moym_display_test_attributes' function. The vulnerability allows remote, unauthenticated access to confidential user information without any user interaction, presenting a direct information disclosure risk. No active exploitation has been confirmed at the time of analysis, though the low attack complexity and CVSS score of 5.3 indicate moderate real-world risk.

Technical ContextAI

The vulnerability stems from CWE-862 (Missing Authorization), a fundamental access control flaw in the YourMembership Single Sign On plugin for WordPress. The 'moym_display_test_attributes' function in the class-moym-sso.php file fails to implement WordPress capability checks before exposing sensitive user profile data. WordPress plugins typically use functions like current_user_can() to verify that only authenticated users with appropriate roles can access administrative or sensitive endpoints. The absence of such controls on what appears to be a test or debugging function leaves the endpoint accessible to any unauthenticated network attacker. The affected product is specifically the login-with-yourmembership plugin, which integrates YourMembership's SSO authentication system into WordPress environments, making it a critical access point for user authentication and profile data.

Affected ProductsAI

The YourMembership Single Sign On (YM SSO Login) WordPress plugin is vulnerable in all versions up to and including 1.1.7. The vulnerable code is located in the class-moym-sso.php file at the 'moym_display_test_attributes' function. No CPE string is provided in the input data, but WordPress plugin identification follows the pattern wp-plugin:login-with-yourmembership. Vendor advisory and patched version information can be accessed through the WordPress plugin repository changeset reference (https://plugins.trac.wordpress.org/changeset/3389623/) and the Wordfence vulnerability intelligence database (https://www.wordfence.com/threat-intel/vulnerabilities/id/1bb25412-8f63-4a9d-84bd-44fac59c6eed).

RemediationAI

Update the YourMembership Single Sign On plugin to the patched version released after 1.1.7 immediately. Review the WordPress plugin repository changeset 3389623 for deployment of the fix, which implements proper capability checks on the 'moym_display_test_attributes' function. Administrators should navigate to the WordPress dashboard, go to Plugins > Installed Plugins, locate 'Login with YourMembership,' and click 'Update Now' once a patched version is available. As an interim workaround pending patch availability, consider disabling the plugin or restricting access to WordPress administrative endpoints at the web server or firewall level. Verify the fix by confirming that unauthenticated requests to the vulnerable function no longer return sensitive profile data. Consult the Wordfence advisory (https://www.wordfence.com/threat-intel/vulnerabilities/id/1bb25412-8f63-4a9d-84bd-44fac59c6eed) for definitive patched version numbers and deployment guidance.

Share

CVE-2025-10648 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy