Home

Description

The Binary MLM Plan plugin for WordPress is vulnerable to insecure direct object reference in versions up to, and including, 3.0. This is due to the bmp_user_payout_detail_of_current_user() function selecting payout records solely by id without verifying ownership. This makes it possible for authenticated attackers with the bmp_user role (often subscribers) to view other members' payout summaries via direct requests to the /bmp-account-detail/ endpoint with a crafted payout-id parameter granted they can access the shortcode output.

PUBLISHED Reserved 2025-10-16 | Published 2025-10-17 | Updated 2025-10-17 | Assigner Wordfence




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

*
affected

Timeline

2025-10-16:Disclosed

Credits

Jonas Benjamin Friedli finder

References

www.wordfence.com/...-29ca-49c5-ac75-bb79d62f6107?source=cve

plugins.trac.wordpress.org/...ncludes/bmp-hook-functions.php

cve.org (CVE-2025-11895)

nvd.nist.gov (CVE-2025-11895)

Download JSON