Description
The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'orderby' parameter in all versions up to, and including, 4.0.60 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-05-02
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The ARMember – Membership Plugin for WordPress contains a time‑based blind SQL injection that allows unauthenticated actors to inject arbitrary SQL statements via the 'orderby' parameter. The flaw is caused by insufficient escaping of user‑supplied data and the lack of prepared statements in the query construction. By exploiting this vulnerability, an attacker can retrieve confidential database contents without authentication, potentially exposing user credentials, membership details, and other sensitive information.

Affected Systems

WordPress sites running ARMember versions 4.0.60 or earlier, including any deployment of the plugin product by Repute Infosystems. The attack occurs when the plugin’s directory or shortcode rendering functions receive an 'orderby' parameter in the HTTP request, and no input validation is performed before it is used in an SQL query.

Risk and Exploitability

The vulnerability has a CVSS score of 7.5, indicating high impact. The EPSS score is not available, so the likelihood of exploitation is unknown, but the flaw is publicly documented and no mitigations are offered by the vendor. The attack likely requires HTTP access to the WordPress front‑end or plugin‑specific URLs that expose the 'orderby' parameter. An attacker can craft a request with a crafted 'orderby' value, such as "order by 1--", to trigger a time delay or flood the database, indicating that the injection succeeds and can be used to extract data. The risk is further amplified by the lack of authentication requirements, meaning any external visitor can exploit it.

Generated by OpenCVE AI on May 2, 2026 at 09:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the ARMember plugin to version 4.0.61 or newer to remove the vulnerable SQL construction.
  • If an update is not possible, disable the plugin or restrict access to the affected URLs so that no unauthenticated users can supply the 'orderby' parameter.
  • Implement a Web Application Firewall or input‑validation rule that blocks suspicious characters or patterns in the 'orderby' query parameter and monitor access logs for abnormal request patterns.

Generated by OpenCVE AI on May 2, 2026 at 09:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 07:30:00 +0000

Type Values Removed Values Added
Description The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'orderby' parameter in all versions up to, and including, 4.0.60 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title ARMember <= 4.0.60 - Unauthenticated SQL Injection via 'orderby' Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-02T06:44:06.753Z

Reserved: 2026-05-01T17:35:49.068Z

Link: CVE-2026-7649

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T08:16:28.403

Modified: 2026-05-02T08:16:28.403

Link: CVE-2026-7649

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T10:00:06Z

Weaknesses