Someone registered without pay possible vulnerability (false positive)

Hello
Today 3 hours ago someone somehow have got access to Lvl1 without pay for around 1 hour he possible edited the paypal codes on payment page.
This is a possible vulnerability i have log of his activity from the point how he got to my site to the point when he left it.
Where should i send this text file so the plugin developers may have a look what he did to get access?

In his account i found in administrative notes 4 different EOT times with 4 different subscriber ID’s.
How to protect from this? No new updates from s2member.

Also there are no payments in paypal or any message about any payments, that is why i consider this to be a hacker.

This is a false positive OMG. :smiley:
Please delete this topic, thank you.
The problem was that person try to pay by credit card and but i can’t receive such payments in my country they must use a paypal account instead, that is why his payment was rejected 4 times.

1 Like

Thanks for the update, Filip! :slight_smile: