Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3281: CWE-639 Authorization Bypass Through User-Controlled Key in wpeverest User Registration & Membership – Custom Registration Form, Login Form, and User Profile

0
Medium
VulnerabilityCVE-2025-3281cvecve-2025-3281cwe-639
Published: Tue May 06 2025 (05/06/2025, 07:24:21 UTC)
Source: CVE
Vendor/Project: wpeverest
Product: User Registration & Membership – Custom Registration Form, Login Form, and User Profile

Description

The User Registration & Membership – Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.2.1 via the create_stripe_subscription() function, due to missing validation on the 'member_id' user controlled key. This makes it possible for unauthenticated attackers to delete arbitrary user accounts that have registered through the plugin.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:26:48 UTC

Technical Analysis

CVE-2025-3281 is an authorization bypass vulnerability categorized under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the wpeverest User Registration & Membership plugin for WordPress. The vulnerability exists in all versions up to 4.2.1 within the create_stripe_subscription() function, where the 'member_id' parameter is taken from user input without proper validation. This insecure direct object reference allows unauthenticated attackers to specify arbitrary user IDs to delete accounts registered through the plugin. Since the function lacks checks to verify the requester's authorization or ownership of the targeted user account, attackers can exploit this flaw remotely over the network without authentication or user interaction. The vulnerability compromises the integrity of user accounts by enabling unauthorized deletions but does not expose sensitive data or cause denial of service. No patches or exploit code are currently publicly available, but the risk remains significant due to the ease of exploitation and the critical nature of user account integrity in membership systems. The CVSS 3.1 base score of 5.3 reflects network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality or availability impact, and limited integrity impact.

Potential Impact

This vulnerability allows attackers to delete arbitrary user accounts without authentication, directly impacting the integrity of user data and membership records. Organizations relying on the affected plugin risk unauthorized account removals, which can disrupt user access, cause loss of user-generated content or membership status, and damage trust in the platform. While confidentiality and availability are not directly impacted, the unauthorized deletion of accounts can lead to operational disruptions, increased support costs, and potential reputational damage. Attackers could target high-value accounts or perform mass deletions to cause significant disruption. The ease of exploitation and lack of required privileges increase the likelihood of attacks, especially on websites with large user bases or critical membership functions. The absence of known exploits in the wild suggests limited current exploitation but does not diminish the urgency for remediation given the potential damage.

Mitigation Recommendations

1. Immediately apply any official patches or updates released by wpeverest addressing this vulnerability. 2. If patches are not yet available, implement web application firewall (WAF) rules to detect and block requests containing suspicious or unexpected 'member_id' parameters in calls to create_stripe_subscription() or related endpoints. 3. Enforce strict server-side validation and authorization checks to ensure that any operation on user accounts verifies the requester's identity and permissions before proceeding. 4. Monitor logs for unusual account deletion activity, especially from unauthenticated sources, and establish alerting mechanisms. 5. Limit exposure of the vulnerable plugin’s endpoints by restricting access via IP whitelisting or requiring authentication where feasible. 6. Educate site administrators about the risk and encourage regular backups of user data to enable recovery from unauthorized deletions. 7. Conduct security audits of other plugins and custom code to identify similar insecure direct object references or authorization bypass issues. 8. Consider temporarily disabling the plugin or its vulnerable features if immediate patching is not possible and the risk is deemed high.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-04T15:15:57.202Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbdaa82

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 2/27/2026, 1:26:48 PM

Last updated: 3/28/2026, 9:16:20 AM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses