CVE-2023-2276

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to bypass authorization in the WCFM Membership plugin for WordPress, enabling them to change user passwords and potentially take over administrator accounts. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • WCFM Membership – WooCommerce Memberships for Multivendor Marketplace
Versions: Up to and including 2.10.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover with administrative privileges, data theft, malware injection, and defacement.

🟠

Likely Case

Unauthorized password changes leading to account compromise, privilege escalation, and potential data access.

🟢

If Mitigated

Limited impact if strong access controls, monitoring, and network segmentation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires minimal technical skill due to public proof-of-concept and unauthenticated access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.8 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2907455/

Restart Required: No

Instructions:

1. Update the WCFM Membership plugin to version 2.10.8 or higher via WordPress admin panel. 2. Verify the update completed successfully. 3. Test functionality to ensure no regression.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the WCFM Membership plugin until patched.

wp plugin deactivate wc-multivendor-membership

Restrict access via web application firewall

all

Block requests to vulnerable endpoints using WAF rules.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the WordPress instance.
  • Enable detailed logging and monitoring for suspicious password change activities.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for plugin version. If WCFM Membership is version 2.10.7 or lower, it is vulnerable.

Check Version:

wp plugin get wc-multivendor-membership --field=version

Verify Fix Applied:

Confirm plugin version is 2.10.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual password reset requests from unauthenticated users
  • Multiple failed login attempts followed by password changes

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action=wcfmvm_membership_register

SIEM Query:

source="wordpress.log" AND ("wcfmvm_membership_register" OR "password reset" FROM unauthenticated_ip)

🔗 References

📤 Share & Export