Description
The User Registration & Membership plugin for WordPress is vulnerable to SQL Injection via the 's' parameter in version 4.3.0. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2025-09-06
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection – potential data exfiltration.
Action: Upgrade Now
AI Analysis

Impact

The User Registration & Membership plugin for WordPress is vulnerable to SQL injection via the 's' parameter in version 4.3.0. The flaw stems from insufficient escaping of user input and the absence of prepared statements, allowing an attacker with administrator‑level access to append arbitrary SQL clauses. This can lead to the extraction or alteration of sensitive data stored in the WordPress database. The weakness is identified as CWE‑89.

Affected Systems

WordPress sites running the User Registration & Membership (wpeverest) plugin version 4.3.0 or earlier are affected. The vulnerability is present in the Admin/Members/MembersListTable.php and Admin/Repositories/MembersRepository.php files as referenced in the official plugin repository.

Risk and Exploitability

The CVSS score of 4.9 indicates a moderate risk profile, while the EPSS score of less than 1% suggests a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated attacker with administrator or higher privileges; thus, the attack vector is private, limited to users with valid admin credentials. If exploited, an attacker could read protected data from the WordPress database, potentially compromising user accounts and site integrity.

Generated by OpenCVE AI on April 20, 2026 at 19:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the User Registration & Membership plugin to version 4.4.0 or later, which removes the vulnerable code.
  • Limit administrator‑level access to trusted personnel and enforce least‑privilege permissions to reduce the attack surface.
  • Perform a thorough review of the WordPress installation for additional outdated or vulnerable plugins and apply any available security updates immediately.

Generated by OpenCVE AI on April 20, 2026 at 19:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 25 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 08 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 06 Sep 2025 02:30:00 +0000

Type Values Removed Values Added
Description The User Registration & Membership plugin for WordPress is vulnerable to SQL Injection via the 's' parameter in version 4.3.0. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title User Registration & Membership <= 4.3.0 - Authenticated (Admin+) SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:18:12.292Z

Reserved: 2025-08-15T16:37:03.929Z

Link: CVE-2025-9085

cve-icon Vulnrichment

Updated: 2025-09-08T20:14:01.475Z

cve-icon NVD

Status : Deferred

Published: 2025-09-06T03:15:41.587

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9085

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T19:45:15Z

Weaknesses