Summary
Detail | |||
---|---|---|---|
Vendor | s2member | First view | 2012-03-19 |
Product | s2member | Last view | 2025-02-15 |
Version | 110731 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:s2member:s2member |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2025-02-15 | CVE-2024-12562 | The s2Member Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 241216 via deserialization of untrusted input from the 's2member_pro_remote_op' vulnerable parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. |
4.3 | 2012-03-19 | CVE-2011-5082 | Cross-site scripting (XSS) vulnerability in the s2Member Pro plugin before 111220 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s2member_pro_authnet_checkout[coupon] parameter (aka Coupon Code field). |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
50% (1) | CWE-502 | Deserialization of Untrusted Data |
50% (1) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |