Description
The Wishlist Member plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'WishListMember\Features\Team_Accounts::save_settings' function in all versions up to, and including, 3.30.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary plugin options, includes the REST API Secret Key, which can be used to create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.
Published: 2026-05-23
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Wishlist Member plugin for WordPress contains a missing capability check in the WishListMember\Features\Team_Accounts::save_settings function, allowing any authenticated user with the Subscriber role or higher to call the wishlistmember_team_accounts_save_settings AJAX endpoint and arbitrarily modify plugin options. This flaw permits changing sensitive configuration values, such as the REST API secret key, creating new membership levels with administrator privileges, or registering arbitrary administrator‑level accounts, effectively granting full control of the site.

Affected Systems

All installations of the Wishlist Member plugin for WordPress up to and including version 3.30.1 are vulnerable. Any WordPress site using these versions is at risk when an authenticated user with a Subscriber‑level role or higher exists.

Risk and Exploitability

With a CVSS score of 8.8 the vulnerability is high severity. Although the EPSS score is unavailable, the lack of an access control check means that an attacker only needs legitimate credentials of a Subscriber or higher. The fact that the flaw is exploitable via a standard AJAX call makes it relatively easy for threat actors with valid accounts to elevate privileges and compromise the entire site, and the vulnerability is not listed in CISA KEV. The high likelihood of exploitation arises from the common presence of Subscriber accounts on WordPress sites and the ease of performing the malicious requests.

Generated by OpenCVE AI on May 23, 2026 at 06:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Wishlist Member plugin to the most recent release that includes proper capability checks, which is the version released after 3.30.1.
  • Temporarily disable the plugin or restrict Subscriber-level access to the affected AJAX endpoint until a patched version is available.
  • Reduce the capabilities of all Subscriber-level accounts so they cannot invoke the vulnerable endpoint or perform privileged actions.

Generated by OpenCVE AI on May 23, 2026 at 06:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 23 May 2026 06:45:00 +0000

Type Values Removed Values Added
First Time appeared Wishlist Member
Wishlist Member wishlist Member
Wordpress
Wordpress wordpress
Vendors & Products Wishlist Member
Wishlist Member wishlist Member
Wordpress
Wordpress wordpress

Sat, 23 May 2026 05:00:00 +0000

Type Values Removed Values Added
Description The Wishlist Member plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'WishListMember\Features\Team_Accounts::save_settings' function in all versions up to, and including, 3.30.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary plugin options, includes the REST API Secret Key, which can be used to create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.
Title Wishlist Member <= 3.30.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Options Update via 'wishlistmember_team_accounts_save_settings' AJAX action
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wishlist Member Wishlist Member
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-23T04:27:17.806Z

Reserved: 2026-04-23T05:52:48.878Z

Link: CVE-2026-6897

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-23T07:00:10Z

Weaknesses