Description
The Wishlist Member plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'WishListMember3_Hooks::generate_api_key' function in all versions up to, and including, 3.30.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the REST API Secret Key, which can be used to create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.
Published: 2026-05-23
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Wishlist Member plugin for WordPress contains a missing capability check in the function that generates its API secret key for all versions up to 3.30.1. This allows any authenticated user with a Subscriber role or higher to alter the REST API secret key. By updating the key, an attacker can create a new membership level that grants the WordPress administrator role or register a new user account with full administrative privileges, resulting in a complete takeover of the site.

Affected Systems

WordPress sites that have the Wishlist Member plugin installed and are running version 3.30.1 or earlier. Sites are vulnerable when the plugin is active and users can authenticate as Subscriber or higher.

Risk and Exploitability

The vulnerability is rated with a CVSS score of 8.8, indicating high severity. The EPSS score is not available and the issue is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is an authenticated attacker who has access to a Subscriber or higher level account. The attacker can trigger the AJAX endpoint ‘wlm3_generate_api_key’ to change the API secret key, then create an administrator-level membership or register an admin user, thereby gaining full site control.

Generated by OpenCVE AI on May 23, 2026 at 07:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Wishlist Member to the latest version that includes the missing capability check for API key generation, which is the only complete fix.
  • If upgrading is not immediately possible, restrict the AJAX endpoint so that only administrators can invoke it—for example, by adding a capability check to the plugin code or by configuring a web‑server rule to block access for non‑admin users.
  • Audit all Subscriber‑level accounts and reduce their privileges to the minimum required for normal operation, removing the Subscriber role from accounts that do not need it to prevent future exploitation.

Generated by OpenCVE AI on May 23, 2026 at 07:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 23 May 2026 06:45:00 +0000

Type Values Removed Values Added
First Time appeared Wishlist Member
Wishlist Member wishlist Member
Wordpress
Wordpress wordpress
Vendors & Products Wishlist Member
Wishlist Member wishlist Member
Wordpress
Wordpress wordpress

Sat, 23 May 2026 05:00:00 +0000

Type Values Removed Values Added
Description The Wishlist Member plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'WishListMember3_Hooks::generate_api_key' function in all versions up to, and including, 3.30.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the REST API Secret Key, which can be used to create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.
Title WishList Member <= 3.30.1 - Missing Authorization to Authenticated (Subscriber+) Generate API Secret Key via 'wlm3_generate_api_key' AJAX action
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wishlist Member Wishlist Member
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-23T04:27:16.364Z

Reserved: 2026-04-23T06:00:50.744Z

Link: CVE-2026-6898

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-23T07:30:12Z

Weaknesses