Description
The clubmember plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: 2025-11-04
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Update Plugin
AI Analysis

Impact

The vulnerability allows any authenticated administrator to inject arbitrary JavaScript into the Clubmember plugin settings page. Because the input is not sanitized and the output is not properly escaped, the injected script is stored and then rendered on pages that load the plugin’s configuration. A compromised page will execute the attacker’s script in the browsers of any user who visits the affected page, potentially enabling cookie theft, session hijacking, or other client‑side attacks.

Affected Systems

The affected product is the Clubmember plugin for WordPress, maintained by alaminopu, in all releases through 0.2 inclusive. The flaw is present only on multi‑site WordPress environments and only when the unfiltered_html capability is disabled. No other WordPress core components are affected. Users should verify the plugin version on their sites and ensure it is either updated to 0.3 or newer or removed from the installation.

Risk and Exploitability

The CVSS v3.1 score of 4.4 indicates moderate severity. The EPSS score is less than 1 %, and it is not listed in the CISA KEV catalog, implying a low likelihood that this weakness is being actively exploited. Nonetheless, the impact is confined to users who have visited an affected page after an administrator injected the script. The attack vector requires the attacker to log in as administrator or a role with equal or higher permissions and edit the Clubmember settings. Successful exploitation results in client‑side code execution on any visitor to the site.

Generated by OpenCVE AI on April 21, 2026 at 01:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Clubmember plugin to the latest released version (≥ 0.3) which includes proper input validation and output escaping.
  • If an immediate update is not possible, deactivate or uninstall the Clubmember plugin from all multisite WordPress installations, especially those where the unfiltered_html capability is disabled.
  • Restrict administrator roles that can edit plugin settings or remove the unfiltered_html capability for those accounts to reduce the risk of stored XSS injection.

Generated by OpenCVE AI on April 21, 2026 at 01:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 04 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 04:45:00 +0000

Type Values Removed Values Added
Description The clubmember plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Title Clubmember <= 0.2 - Authenticated (Admin+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:35:14.205Z

Reserved: 2025-10-28T13:49:08.547Z

Link: CVE-2025-12396

cve-icon Vulnrichment

Updated: 2025-11-04T14:41:41.226Z

cve-icon NVD

Status : Deferred

Published: 2025-11-04T05:16:12.163

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12396

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:00:12Z

Weaknesses