Description
The WishList Member plugin for WordPress is vulnerable to Missing Authorization leading to Sensitive Information Disclosure and Privilege Escalation in versions up to and including 3.30.1. This is due to the missing capability checks in the 'export_settings' function. This function returns the REST API Secret Key to the attacker in the AJAX JSON response. An attacker who obtains this key can authenticate to the WishList Member API, create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.
Published: 2026-05-23
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A missing authorization check in the export_settings function of the Wishlist Member plugin allows an authenticated user with Subscriber+ privileges to receive the plugin’s REST API secret key in an AJAX JSON response. With this key, the attacker can authenticate to the plugin’s API, create a membership level that grants the WordPress administrator role, and register an arbitrary user with that role, effectively taking over the site. This flaw hinges on a lack of capability verification, making it a classic Privilege Escalation vulnerability that also leaks a sensitive credential. The impact is full control of the WordPress installation, including the ability to add users, modify settings, and access or delete site content.

Affected Systems

The vulnerability affects all installations of the Wishlist Member plugin for WordPress up to and including version 3.30.1. Any site using those versions is at risk; newer releases are presumed to contain the fix.

Risk and Exploitability

The CVSS score of 8.8 classifies this flaw as High severity, with a high likelihood of exploitation in a site that has any Subscriber+ user. Although an EPSS score is not available and the vulnerability is not listed in CISA’s KEV catalog, the nature of the attack—returning a secret key via a public API endpoint—indicates that exploitation could occur without complex prerequisites. An attacker needs only an authenticated session with limited privileges to trigger the export_settings action and exploit the disclosed secret key.

Generated by OpenCVE AI on May 23, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Wishlist Member update (3.30.2 or newer) to remove the missing authorization checks and secure the API secret key handling.
  • Restrict the export_settings AJAX action so that only users with administrator privileges can trigger it, or disable the action entirely for lower‑privileged roles.
  • After applying the patch, audit user accounts to ensure that no unauthorized administrator‑level users have been created and remove any suspicious accounts.

Generated by OpenCVE AI on May 23, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 23 May 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Wishlist Member
Wishlist Member wishlist Member
Wordpress
Wordpress wordpress
Vendors & Products Wishlist Member
Wishlist Member wishlist Member
Wordpress
Wordpress wordpress

Sat, 23 May 2026 05:00:00 +0000

Type Values Removed Values Added
Description The WishList Member plugin for WordPress is vulnerable to Missing Authorization leading to Sensitive Information Disclosure and Privilege Escalation in versions up to and including 3.30.1. This is due to the missing capability checks in the 'export_settings' function. This function returns the REST API Secret Key to the attacker in the AJAX JSON response. An attacker who obtains this key can authenticate to the WishList Member API, create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.
Title Wishlist Member <= 3.30.1 - Missing Authorization to Authenticated (Subscriber+) API Secret Key Disclosure and Privilege Escalation via 'wlm3_export_settings' AJAX Action
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wishlist Member Wishlist Member
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-23T04:27:17.035Z

Reserved: 2026-04-23T05:19:57.635Z

Link: CVE-2026-6895

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-23T07:00:09Z

Weaknesses