Description
The User Registration & Membership plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `embed_form_action()` function in all versions up to, and including, 5.1.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to append shortcode content to arbitrary pages they do not own or have permission to edit.
Published: 2026-05-05
Score: 4.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a missing authorization check (CWE-862) in the embed_form_action() function of the User Registration & Membership plugin. Authenticated users with Contributor privileges or higher can add shortcode content to any page they cannot normally edit, enabling unauthorized content modification. This compromises site integrity, allowing attackers to deface or inject malicious content onto pages they do not own.

Affected Systems

The vulnerability affects the WordPress User Registration & Membership plugin developed by WpEverest. All releases up to and including version 5.1.4 are impacted. The plugin operates within the WordPress content management system, allowing Contributors and roles with equivalent privileges to exploit the flaw.

Risk and Exploitability

The CVSS base score of 4.3 indicates a moderate risk. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to be authenticated with a Contributor role or higher and uses the plugin’s embed_form_action() endpoint to append shortcodes to any page, thereby bypassing normal WordPress permission checks. The missing capability check makes the attack trivial for any user with sufficient role membership.

Generated by OpenCVE AI on May 5, 2026 at 09:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the User Registration & Membership plugin to the latest available version (5.1.5 or newer) that includes the missing capability check.
  • Restrict Contributor-level roles by removing the capability to edit pages or embed shortcodes, ensuring only administrators can modify content.
  • As a temporary workaround, deploy a role‑management or security plugin that blocks contributors from executing the embed_form_action function or add an additional capability check via custom code.

Generated by OpenCVE AI on May 5, 2026 at 09:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpeverest
Wpeverest user Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder
Vendors & Products Wordpress
Wordpress wordpress
Wpeverest
Wpeverest user Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder

Tue, 05 May 2026 08:30:00 +0000

Type Values Removed Values Added
Description The User Registration & Membership plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `embed_form_action()` function in all versions up to, and including, 5.1.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to append shortcode content to arbitrary pages they do not own or have permission to edit.
Title User Registration & Membership <= 5.1.4 - Missing Authorization to Authenticated (Contributor+) Limited Page Content Modification
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
Wpeverest User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-05T08:27:36.202Z

Reserved: 2026-03-05T14:40:38.401Z

Link: CVE-2026-3601

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T09:16:03.980

Modified: 2026-05-05T09:16:03.980

Link: CVE-2026-3601

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T09:30:21Z

Weaknesses