Description
Cross-Site Request Forgery (CSRF) vulnerability in wp.insider Simple Membership WP user Import simple-membership-wp-user-import allows Cross Site Request Forgery.This issue affects Simple Membership WP user Import: from n/a through <= 1.9.1.
Published: 2026-02-03
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery can lead to unauthorized account creation or modification in WordPress sites using this plugin
Action: Update Plugin
AI Analysis

Impact

The vulnerability is a cross‑site request forgery flaw within the Simple Membership WP user Import plugin, allowing an attacker to trick an authenticated user into loading a crafted request that causes the plugin to perform a user import operation. As the import process can create or modify accounts, the attacker could potentially create new administrative accounts or alter existing user data without permission. The flaw stems from the plugin not verifying the caller's intent before executing the import action, a typical instance of CWE‑352.

Affected Systems

Affected only the wp.insider Simple Membership WP user Import plugin, versions 1.9.1 and lower. The plugin is a WordPress add‑on that facilitates bulk user imports via CSV files. Sites running any of these versions are vulnerable regardless of configuration. No other plugins or WordPress core components are implicated.

Risk and Exploitability

The CVSS base score of 5.4, combined with an EPSS of less than 1 %, indicates a moderate severity and a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Attack execution requires a victim to be logged in with sufficient privileges to access the plugin’s import interface and then be tricked into visiting a malicious request; thus manual user interaction is generally required. Because no exploit has been publicly disclosed, the overall risk remains limited but still warrants remediation.

Generated by OpenCVE AI on April 16, 2026 at 01:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Simple Membership WP user Import plugin to the latest patched version (e.g., 1.9.2 or newer).
  • If an update is not immediately available, temporarily disable the plugin until a fix is released to eliminate the vulnerable functionality.
  • Configure your web‑application firewall or server environment to reject POST requests to the import endpoint unless they originate from authenticated and authorized source IPs or contain a valid CSRF token.

Generated by OpenCVE AI on April 16, 2026 at 01:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wp.insider
Wp.insider simple Membership Wp User Import
Vendors & Products Wordpress
Wordpress wordpress
Wp.insider
Wp.insider simple Membership Wp User Import

Tue, 03 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 14:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in wp.insider Simple Membership WP user Import simple-membership-wp-user-import allows Cross Site Request Forgery.This issue affects Simple Membership WP user Import: from n/a through <= 1.9.1.
Title WordPress Simple Membership WP user Import plugin <= 1.9.1 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Wordpress Wordpress
Wp.insider Simple Membership Wp User Import
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:52.533Z

Reserved: 2026-01-28T09:50:46.305Z

Link: CVE-2026-24986

cve-icon Vulnrichment

Updated: 2026-02-03T16:27:46.379Z

cve-icon NVD

Status : Deferred

Published: 2026-02-03T15:16:17.797

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24986

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T01:30:20Z

Weaknesses