Description
Missing Authorization vulnerability in Tips and Tricks HQ WP eMember wp-eMember allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP eMember: from n/a through <= v10.2.2.
Published: 2026-03-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access / Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

The WP eMember plugin for WordPress exhibits a missing authorization weakness (CWE‑862) that permits users to act with higher privileges than intended. Affected versions are all releases up through v10.2.2. Exploitation can allow an attacker to read or modify protected data, configure settings, or perform administrative actions without proper authentication. The CVSS v3 score of 5.3 indicates moderate severity, reflecting potential for unauthorized access rather than complete code execution or denial of service.

Affected Systems

Affected systems include any WordPress site running the Tips and Tricks HQ WP eMember plugin from the earliest available release through v10.2.2. Prior versions are equally impacted because the issue is present until the update to 10.2.2; an update to a newer version or removal of the plugin is necessary to mitigate the risk.

Risk and Exploitability

Risk remains medium due to the lack of publicly available exploits or EPSS data, and the vulnerability is not listed in CISA's KEV catalog. The attack vector is inferred to be remote via the web interface, requiring a user to navigate to a protected resource that is incorrectly accessible. There is no official workaround; therefore, sites should upgrade the plugin promptly or disable affected functionality until a patched version is released.

Generated by OpenCVE AI on March 19, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP eMember to the latest version (>=10.2.3) once available.
  • If an update is not possible, restrict user access levels or disable the plugin to prevent unauthorized use.
  • Monitor the WordPress admin area for anomalous activity and review user permissions.
  • Check the vendor’s website or plugin repository for security notices regularly.

Generated by OpenCVE AI on March 19, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:45:00 +0000


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Tips and Tricks HQ WP eMember allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP eMember: from n/a through v10.2.2. Missing Authorization vulnerability in Tips and Tricks HQ WP eMember wp-eMember allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP eMember: from n/a through <= v10.2.2.
References

Thu, 19 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Tipsandtricks-hq
Tipsandtricks-hq wp Emember
Wordpress
Wordpress wordpress
Vendors & Products Tipsandtricks-hq
Tipsandtricks-hq wp Emember
Wordpress
Wordpress wordpress

Thu, 19 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Tips and Tricks HQ WP eMember allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP eMember: from n/a through v10.2.2.
Title WordPress WP eMember plugin <= v10.2.2 - Broken Access Control vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Tipsandtricks-hq Wp Emember
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:11.237Z

Reserved: 2026-02-25T12:13:39.590Z

Link: CVE-2026-28070

cve-icon Vulnrichment

Updated: 2026-03-19T14:48:54.862Z

cve-icon NVD

Status : Deferred

Published: 2026-03-19T06:16:26.360

Modified: 2026-04-23T15:37:22.590

Link: CVE-2026-28070

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:55:24Z

Weaknesses