Description
The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability and validation check on the PMS_AJAX_Checkout_Handler::process_payment() function in all versions up to, and including, 2.16.4. This makes it possible for unauthenticated attackers to trigger stored auto-renew charges for arbitrary members.
Published: 2025-11-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Auto-renew Charges
Action: Immediate Patch
AI Analysis

Impact

The vulnerability lies in the process_payment function of the Paid Membership Subscriptions plugin. A missing capability check allows an unauthenticated user to invoke the AJAX checkout handler and trigger a stored payment to renew a member's subscription. This results in an unauthorized charge being processed, potentially causing financial loss for the site owner.

Affected Systems

All installations of the CozmosLabs Paid Membership Subscriptions plugin that are using version 2.16.4 or any earlier version are affected. No further sub‑version details are specified, so the vulnerability is believed to be present across all releases up to and including 2.16.4.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, while the EPSS score of less than 1% suggests that exploitation is unlikely at present. The flaw allows an attacker to send a crafted HTTP request to the AJAX endpoint without authentication, which can trigger a member renewal. Because the endpoint processes payments automatically, the impact on merchants depends on the number of active subscriptions and the ease with which an attacker can identify member identifiers. The vulnerability is not listed in the CISA KEV catalog.

Generated by OpenCVE AI on April 21, 2026 at 18:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Paid Membership Subscriptions plugin to a version newer than 2.16.4 when a vendor patch is released.
  • If an update is not yet available, temporarily disable the auto‑renew feature or configure the AJAX checkout endpoint to require administrator authentication.
  • Add server‑side capability verification before processing any auto‑renew transaction to ensure that only authorized users can trigger payments.
  • Regularly review payment logs for unexpected renewal events and suspend any accounts involved in suspicious activity.

Generated by OpenCVE AI on April 21, 2026 at 18:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 07 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 05 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Cozmoslabs
Cozmoslabs paid Membership Subscriptions
Wordpress
Wordpress wordpress
Vendors & Products Cozmoslabs
Cozmoslabs paid Membership Subscriptions
Wordpress
Wordpress wordpress

Wed, 05 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability and validation check on the PMS_AJAX_Checkout_Handler::process_payment() function in all versions up to, and including, 2.16.4. This makes it possible for unauthenticated attackers to trigger stored auto-renew charges for arbitrary members.
Title Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction <= 2.16.4 - Missing Authorization to Unauthenticated Arbitrary Member Subscription Auto Renewal
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Cozmoslabs Paid Membership Subscriptions
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:31:09.651Z

Reserved: 2025-10-15T21:48:26.282Z

Link: CVE-2025-11835

cve-icon Vulnrichment

Updated: 2025-11-05T14:20:20.538Z

cve-icon NVD

Status : Deferred

Published: 2025-11-05T04:15:32.063

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11835

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:45:06Z

Weaknesses