CVE-2024-1987: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in cbutlerjr WP-Members Membership Plugin
CVE-2024-1987 is a stored cross-site scripting (XSS) vulnerability in the WP-Members Membership Plugin for WordPress, affecting all versions up to 3. 4. 9. 1. The flaw arises from insufficient input sanitization and output escaping on user-supplied shortcode attributes, allowing authenticated users with contributor-level or higher permissions to inject malicious scripts. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions. The vulnerability requires no user interaction beyond visiting the infected page but does require authenticated access with contributor or higher privileges. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low attack complexity and partial confidentiality and integrity impact. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2024-1987 is a stored cross-site scripting (XSS) vulnerability identified in the WP-Members Membership Plugin for WordPress, developed by cbutlerjr. This vulnerability affects all plugin versions up to and including 3.4.9.1. The root cause is improper neutralization of script-related HTML tags (CWE-80) due to insufficient input sanitization and output escaping on user-supplied attributes within the plugin's shortcode functionality. Authenticated users with contributor-level or higher permissions can exploit this flaw by injecting arbitrary JavaScript code into pages via shortcode attributes. Because the malicious script is stored persistently, it executes whenever any user accesses the infected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability does not require user interaction beyond page access and has a CVSS v3.1 base score of 6.4, indicating medium severity. The attack vector is network-based with low complexity, requiring privileges but no user interaction. The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges by impacting other users. There are no known public exploits or patches currently available, emphasizing the need for proactive mitigation. This vulnerability is particularly concerning for sites with multiple contributors and public membership areas, as it can facilitate privilege escalation or persistent compromise of user accounts and site integrity.
Potential Impact
The impact of CVE-2024-1987 is significant for organizations using the WP-Members Membership Plugin, especially those with multiple contributors or public-facing membership sites. Successful exploitation allows attackers to inject persistent malicious scripts that execute in the browsers of site visitors, potentially leading to session hijacking, theft of sensitive information, unauthorized actions performed with victim user privileges, and defacement or redirection attacks. This undermines user trust and can lead to reputational damage, data breaches, and compliance violations. Since the vulnerability requires contributor-level access, attackers may leverage compromised or weak contributor accounts to escalate their impact. The scope change means that the attack affects users beyond the attacker’s privileges, increasing the risk of widespread compromise. Although no known exploits are reported in the wild, the ease of exploitation and medium CVSS score suggest that attackers could weaponize this vulnerability. Organizations relying on this plugin for membership management are at risk of targeted attacks, especially in sectors with sensitive user data or high-value memberships.
Mitigation Recommendations
To mitigate CVE-2024-1987, organizations should first verify if they are using the WP-Members Membership Plugin version 3.4.9.1 or earlier and plan immediate updates once a patched version is released. In the absence of an official patch, administrators should restrict contributor-level permissions to trusted users only and audit existing contributor accounts for suspicious activity. Implementing a Web Application Firewall (WAF) with custom rules to detect and block malicious script payloads in shortcode attributes can reduce risk. Additionally, site administrators can temporarily disable shortcode usage or restrict shortcode attribute inputs via custom code filters to sanitize inputs more aggressively. Enforcing strong authentication and monitoring user activity logs for anomalous behavior can help detect exploitation attempts early. Regular security scanning and penetration testing focused on XSS vulnerabilities in membership areas are recommended. Finally, educating contributors about secure input practices and the risks of injecting untrusted content can reduce accidental exploitation.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-1987: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in cbutlerjr WP-Members Membership Plugin
Description
CVE-2024-1987 is a stored cross-site scripting (XSS) vulnerability in the WP-Members Membership Plugin for WordPress, affecting all versions up to 3. 4. 9. 1. The flaw arises from insufficient input sanitization and output escaping on user-supplied shortcode attributes, allowing authenticated users with contributor-level or higher permissions to inject malicious scripts. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions. The vulnerability requires no user interaction beyond visiting the infected page but does require authenticated access with contributor or higher privileges. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low attack complexity and partial confidentiality and integrity impact. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2024-1987 is a stored cross-site scripting (XSS) vulnerability identified in the WP-Members Membership Plugin for WordPress, developed by cbutlerjr. This vulnerability affects all plugin versions up to and including 3.4.9.1. The root cause is improper neutralization of script-related HTML tags (CWE-80) due to insufficient input sanitization and output escaping on user-supplied attributes within the plugin's shortcode functionality. Authenticated users with contributor-level or higher permissions can exploit this flaw by injecting arbitrary JavaScript code into pages via shortcode attributes. Because the malicious script is stored persistently, it executes whenever any user accesses the infected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability does not require user interaction beyond page access and has a CVSS v3.1 base score of 6.4, indicating medium severity. The attack vector is network-based with low complexity, requiring privileges but no user interaction. The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges by impacting other users. There are no known public exploits or patches currently available, emphasizing the need for proactive mitigation. This vulnerability is particularly concerning for sites with multiple contributors and public membership areas, as it can facilitate privilege escalation or persistent compromise of user accounts and site integrity.
Potential Impact
The impact of CVE-2024-1987 is significant for organizations using the WP-Members Membership Plugin, especially those with multiple contributors or public-facing membership sites. Successful exploitation allows attackers to inject persistent malicious scripts that execute in the browsers of site visitors, potentially leading to session hijacking, theft of sensitive information, unauthorized actions performed with victim user privileges, and defacement or redirection attacks. This undermines user trust and can lead to reputational damage, data breaches, and compliance violations. Since the vulnerability requires contributor-level access, attackers may leverage compromised or weak contributor accounts to escalate their impact. The scope change means that the attack affects users beyond the attacker’s privileges, increasing the risk of widespread compromise. Although no known exploits are reported in the wild, the ease of exploitation and medium CVSS score suggest that attackers could weaponize this vulnerability. Organizations relying on this plugin for membership management are at risk of targeted attacks, especially in sectors with sensitive user data or high-value memberships.
Mitigation Recommendations
To mitigate CVE-2024-1987, organizations should first verify if they are using the WP-Members Membership Plugin version 3.4.9.1 or earlier and plan immediate updates once a patched version is released. In the absence of an official patch, administrators should restrict contributor-level permissions to trusted users only and audit existing contributor accounts for suspicious activity. Implementing a Web Application Firewall (WAF) with custom rules to detect and block malicious script payloads in shortcode attributes can reduce risk. Additionally, site administrators can temporarily disable shortcode usage or restrict shortcode attribute inputs via custom code filters to sanitize inputs more aggressively. Enforcing strong authentication and monitoring user activity logs for anomalous behavior can help detect exploitation attempts early. Regular security scanning and penetration testing focused on XSS vulnerabilities in membership areas are recommended. Finally, educating contributors about secure input practices and the risks of injecting untrusted content can reduce accidental exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-02-28T19:16:22.624Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d46b7ef31ef0b56fe8e
Added to database: 2/25/2026, 9:44:38 PM
Last enriched: 2/26/2026, 10:03:47 AM
Last updated: 2/26/2026, 11:23:59 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.