Description
The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification and disruption of Stripe webhook configuration in all versions up to, and including, 3.6.5. This is due to missing capability checks on the `wp_ajax_pmpro_stripe_create_webhook`, `wp_ajax_pmpro_stripe_delete_webhook`, and `wp_ajax_pmpro_stripe_rebuild_webhook` AJAX handlers. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete, create, or rebuild the site's Stripe webhook, disrupting all payment processing, subscription renewal synchronization, cancellation handling, and failed payment management.
Published: 2026-05-02
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Paid Memberships Pro plugin for WordPress contains missing capability checks on three AJAX handlers that manage Stripe webhook configuration. Because the checks are omitted, any authenticated user with Subscriber‑level access or higher can delete, create, or rebuild the Stripe webhook. This enables an attacker to disable payment processing, subscription renewal, cancellation handling, and failed‑payment notifications, effectively disrupting the site’s monetary transactions. The vulnerability is reported with a CVSS score of 7.1, which indicates a considerable risk to the integrity and availability of the payment workflow.

Affected Systems

All installations of Paid Memberships Pro for WordPress version 3.6.5 or older are affected. The plugin is maintained by Stranger Studios and is used for content restriction, user registration, and paid subscriptions. Versions after 3.6.5 are not impacted, but it is unclear from the data whether higher releases exist.

Risk and Exploitability

The vulnerability can be exploited only by users who are already authenticated and possess at least Subscriber privileges, a role that typically is assigned to ordinary site members. Because the flaw provides no network‑level entry vector and EPSS data is unavailable, the likelihood of exploitation depends on the site exposing the WordPress AJAX admin route and the presence of a vulnerable user. The CVSS score of 7.1 reflects the medium severity, and the lack of listing in the CISA KEV catalog indicates there is no publicly known exploit at the time of analysis.

Generated by OpenCVE AI on May 2, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Paid Memberships Pro to the latest version (3.6.6 or greater) where the AJAX capability checks have been restored.
  • Immediately disable or remove all users with Subscriber‑level access or any role that grants the capability to use the wp_ajax_pmpro_* Stripe endpoints until the patch is applied.
  • Verify that the Stripe webhook is correctly configured and that the site’s admin interface restricts access to the wp_ajax_pmpro_stripe_* handlers to users with administrator privileges only.

Generated by OpenCVE AI on May 2, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 11:45:00 +0000

Type Values Removed Values Added
Description The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification and disruption of Stripe webhook configuration in all versions up to, and including, 3.6.5. This is due to missing capability checks on the `wp_ajax_pmpro_stripe_create_webhook`, `wp_ajax_pmpro_stripe_delete_webhook`, and `wp_ajax_pmpro_stripe_rebuild_webhook` AJAX handlers. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete, create, or rebuild the site's Stripe webhook, disrupting all payment processing, subscription renewal synchronization, cancellation handling, and failed payment management.
Title Paid Memberships Pro <= 3.6.5 - Missing Authorization to Authenticated (Subscriber+) Stripe Webhook Deletion and Payment Processing Disruption
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-02T11:16:09.788Z

Reserved: 2026-03-13T00:23:37.614Z

Link: CVE-2026-4100

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T12:16:16.477

Modified: 2026-05-02T12:16:16.477

Link: CVE-2026-4100

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T13:30:43Z

Weaknesses