Description
The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authenticated attackers, with Contributor-level access and above, to craft a malicious pending post that, when previewed by an Administrator, generates a password reset token for the Administrator and exfiltrates it to an attacker-controlled server, leading to full account takeover.
Published: 2026-03-27
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: Account Takeover via Password Reset Exploit
Action: Immediate Patch
AI Analysis

Impact

The Ultimate Member plugin’s ‘{usermeta:password_reset_link}’ tag can be abused inside the [um_loggedin] shortcode. A logged‑in user with Contributor rights can embed a request that, when an Administrator previews a pending post, causes the plugin to fabricate a valid password reset token for that Administrator. The token is then sent to a malicious server, allowing the attacker to reset the Administrator’s password and take full control of the site. This flaw is a clear example of broken access control, classified as CWE‑285, and leads to loss of confidentiality and integrity for privileged accounts.

Affected Systems

All WordPress sites running Ultimate Member up to version 2.11.2, including the default installation of Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin. The flaw affects any site where users can submit or preview pending posts containing the vulnerable shortcode. No specific CRM or server software is listed beyond WordPress, so any environment using this plugin is vulnerable.

Risk and Exploitability

The CVSS score of 8.0 places this vulnerability in the high severity range. Although EPSS data is unavailable, the exploit is straightforward: an authenticated user can create or edit a pending post to insert the dangerous tag, and an Administrator must preview the post. The vulnerability is not yet listed in CISA’s KEV catalog. The required privileges (Contributor+) mean that a wide range of users could trigger the attack, and the ability to exfiltrate a reset token directly leads to account takeover. Given the low technical barrier, the real risk to sites that have not patched this plugin is significant.

Generated by OpenCVE AI on March 28, 2026 at 05:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Ultimate Member to version 2.11.3 or later
  • Verify that no pending posts contain the '{usermeta:password_reset_link}' shortcode before updating
  • Ensure all pending posts are removed or sanitized
  • Inspect administrator accounts for unexpected changes and reset passwords if necessary
  • Monitor logs for unusual password reset requests

Generated by OpenCVE AI on March 28, 2026 at 05:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authenticated attackers, with Contributor-level access and above, to craft a malicious pending post that, when previewed by an Administrator, generates a password reset token for the Administrator and exfiltrates it to an attacker-controlled server, leading to full account takeover.
Title Ultimate Member <= 2.11.2 - Authenticated (Contributor+) Sensitive Information Exposure to Account Takeover via Shortcode Template Tag
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-03-27T22:26:22.535Z

Reserved: 2026-03-16T05:30:05.899Z

Link: CVE-2026-4248

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T23:17:14.753

Modified: 2026-03-27T23:17:14.753

Link: CVE-2026-4248

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:29:24Z

Weaknesses