CVE-2023-52200

9.6 CRITICAL

📋 TL;DR

This vulnerability in the ARMember WordPress plugin allows attackers to perform Cross-Site Request Forgery (CSRF) attacks that lead to PHP object injection via deserialization of untrusted data. Attackers can execute arbitrary code on affected WordPress sites, potentially compromising the entire website. All WordPress sites using vulnerable versions of the ARMember plugin are affected.

💻 Affected Systems

Products:
  • ARMember - Membership Plugin, Content Restriction, Member Levels, User Profile & User signup
Versions: Versions up to and including 4.0.22
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Both free (Lite) and premium versions are affected. WordPress multisite installations are also vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete website takeover, data theft, malware installation, and server compromise leading to lateral movement within the hosting environment.

🟠

Likely Case

Website defacement, credential theft, backdoor installation, and unauthorized access to member data and administrative functions.

🟢

If Mitigated

Limited impact with proper CSRF protections and input validation in place, though the vulnerability still presents significant risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user (including administrators) to visit a malicious page. The CSRF vulnerability enables the PHP object injection attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.23 and later

Vendor Advisory: https://patchstack.com/database/vulnerability/armember-membership/wordpress-armember-lite-plugin-4-0-22-cross-site-request-forgery-csrf-to-php-object-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find ARMember plugin. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download version 4.0.23+ from WordPress.org and replace the plugin files.

🔧 Temporary Workarounds

Disable ARMember Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate armember-membership

Implement CSRF Protection

all

Add WordPress nonce verification to all plugin forms and AJAX requests

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block CSRF attacks and suspicious deserialization attempts
  • Restrict plugin access to trusted IP addresses only using .htaccess or web server configuration

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > ARMember version. If version is 4.0.22 or lower, the site is vulnerable.

Check Version:

wp plugin get armember-membership --field=version

Verify Fix Applied:

Verify ARMember plugin version is 4.0.23 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to ARMember plugin endpoints
  • CSRF token validation failures
  • PHP deserialization errors in web server logs

Network Indicators:

  • Multiple failed CSRF attempts from same source
  • Suspicious referer headers in requests to ARMember endpoints

SIEM Query:

source="web_server.log" AND ("armember" OR "wp-admin/admin-ajax.php") AND ("action=arm_" OR "deserialize" OR "unserialize")

🔗 References

📤 Share & Export