Description
The Tiare Membership plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2. This is due to the 'tiare_membership_init_rest_api_register' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.
Published: 2025-11-27
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation to Administrator
Action: Immediate Patch
AI Analysis

Impact

The Tiare Membership plugin for WordPress contains a flaw that allows an unauthenticated user to assign the administrator role during the registration process. The vulnerability arises from the ‘tiare_membership_init_rest_api_register’ function failing to restrict which user roles may be registered. As a result, an attacker can obtain full administrative control of the WordPress site, compromising confidentiality, integrity, and availability of all site data and functions.

Affected Systems

The bug affects all releases of the Tiare Membership plugin up to and including version 1.2, distributed by Qode Interactive. The impacted systems are WordPress installations that have the vulnerable plugin installed and active, regardless of site size or owner.

Risk and Exploitability

The CVSS score of 9.8 reflects a severe vulnerability that can be exploited remotely with no authentication. The EPSS score of less than 1% indicates that while exploitation is technically possible, it is unlikely to be widely seen in the wild; nevertheless the potential impact is catastrophic. The vulnerability is not listed in the CISA KEV catalog, but the risk remains high because unauthenticated attackers can elevate to administrator without any additional privileges. The likely attack vector is a simple POST request to the registration endpoint, supplied with a payload that sets the role field to administrator.

Generated by OpenCVE AI on April 21, 2026 at 17:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Tiare Membership plugin to a patched version newer than 1.2 or remove the plugin if an update is not available
  • If a newer version cannot be installed, disable the public registration API – for example by adding a filter that blocks any role assignment other than default or by turning off the REST endpoint entirely
  • After applying the fix, audit the existing user database to ensure that no unintended administrator accounts were created from unauthenticated registrations

Generated by OpenCVE AI on April 21, 2026 at 17:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 28 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 27 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 27 Nov 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Tiare Membership plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2. This is due to the 'tiare_membership_init_rest_api_register' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.
Title Tiare Membership <= 1.2 - Unauthenticated Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:59:18.911Z

Reserved: 2025-11-22T06:08:44.380Z

Link: CVE-2025-13540

cve-icon Vulnrichment

Updated: 2025-11-28T14:42:06.127Z

cve-icon NVD

Status : Deferred

Published: 2025-11-27T05:16:14.293

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13540

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:00:11Z

Weaknesses