Description
The WishList Member plugin for WordPress is vulnerable to Privilege Escalation via Missing Authorization in versions up to and including 3.30.1. This is due to the missing capability and nonce check in the ajax_get_screen() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to supply an arbitrary admin screen identifier via the data[url] parameter, causing the plugin to load and execute the administrative API configuration template without authorization. The rendered HTML, which contains the plugin's plaintext REST API Secret Key, is returned directly to the attacker in the AJAX JSON response. An attacker who obtains this key can authenticate to the WishList Member API, create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.
Published: 2026-05-23
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A missing capability and nonce check in the WishList Member plugin’s ajax_get_screen() function allows an authenticated attacker who has at least Subscriber level access to supply an arbitrary admin screen identifier via the data[url] parameter. The plugin then loads and executes the administrative API configuration template, returning the plugin’s plaintext REST API Secret Key in the AJAX JSON response. Because the key can be used to authenticate to WishList Member’s API, an attacker can create a new membership level assigning the administrator WordPress role and register an arbitrary admin‑level user account, ultimately compromising the entire site. This flaw is classed as CWE‑269 (Improper Privilege Management).

Affected Systems

The vulnerability impacts the WishList Member WordPress plugin for all releases up to and including version 3.30.1. Affected customers must be aware that any user who is logged in with at least Subscriber‑level privileges can potentially exploit the flaw. No other products or versions are listed.

Risk and Exploitability

With a CVSS score of 8.8, the flaw is rated High severity. EPSS data is not available, but the lack of a nonce and capability check makes the attack trivial for any authenticated subscriber, meaning the probability of exploitation is high whenever logged‑in users exist. The flaw is not listed in the CISA KEV catalog. Exploits would target the wlm3_get_screen AJAX endpoint, submit a crafted data[url] value, and retrieve the API secret key in the JSON response, then use that key to exploit the WishList Member API to create actors with administrator privileges.

Generated by OpenCVE AI on May 23, 2026 at 06:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WishList Member to the latest release that includes the missing authorization check for the wlm3_get_screen AJAX action.
  • If immediate upgrade is not possible, restrict access to the wlm3_get_screen endpoint so that only administrators can invoke it, or block the endpoint entirely through firewall or .htaccess rules.
  • Regenerate or rotate the WishList Member API Secret Key, disable its exposure in the plugin’s configuration screen, and monitor for any unauthorized use of the key.

Generated by OpenCVE AI on May 23, 2026 at 06:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 23 May 2026 07:45:00 +0000

Type Values Removed Values Added
First Time appeared Wishlist Member
Wishlist Member wishlist Member
Wordpress
Wordpress wordpress
Vendors & Products Wishlist Member
Wishlist Member wishlist Member
Wordpress
Wordpress wordpress

Sat, 23 May 2026 05:00:00 +0000

Type Values Removed Values Added
Description The WishList Member plugin for WordPress is vulnerable to Privilege Escalation via Missing Authorization in versions up to and including 3.30.1. This is due to the missing capability and nonce check in the ajax_get_screen() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to supply an arbitrary admin screen identifier via the data[url] parameter, causing the plugin to load and execute the administrative API configuration template without authorization. The rendered HTML, which contains the plugin's plaintext REST API Secret Key, is returned directly to the attacker in the AJAX JSON response. An attacker who obtains this key can authenticate to the WishList Member API, create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.
Title Wishlist Member <= 3.30.1 - Missing Authorization to Authenticated (Subscriber+) API Secret Key Disclosure and Privilege Escalation via 'wlm3_get_screen' AJAX action
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wishlist Member Wishlist Member
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-23T04:27:18.183Z

Reserved: 2026-04-16T05:33:19.683Z

Link: CVE-2026-6419

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-23T07:45:12Z

Weaknesses