Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1779: CWE-288 Authentication Bypass Using an Alternate Path or Channel in wpeverest User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder

0
High
VulnerabilityCVE-2026-1779cvecve-2026-1779cwe-288
Published: Thu Feb 26 2026 (02/26/2026, 02:23:56 UTC)
Source: CVE Database V5
Vendor/Project: wpeverest
Product: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder

Description

The User Registration & Membership plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.1.2. This is due to incorrect authentication in the 'register_member' function. This makes it possible for unauthenticated attackers to log in a newly registered user on the site who has the 'urm_user_just_created' user meta set.

AI-Powered Analysis

AILast updated: 02/26/2026, 14:55:49 UTC

Technical Analysis

CVE-2026-1779 is an authentication bypass vulnerability classified under CWE-288, found in the wpeverest User Registration & Membership plugin for WordPress, affecting all versions up to and including 5.1.2. The vulnerability arises from improper authentication checks within the 'register_member' function. Specifically, when a new user is registered, the plugin sets a user meta flag 'urm_user_just_created'. Due to flawed logic, an unauthenticated attacker can exploit this condition to log in as that newly created user without providing valid credentials or undergoing normal authentication procedures. This bypasses standard security controls, granting unauthorized access to user accounts. The vulnerability is remotely exploitable over the network without any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:H/PR:N/UI:N). The high attack complexity (AC:H) suggests some conditions must be met, but no authentication or user interaction is required. The impact is severe, affecting confidentiality, integrity, and availability, as attackers can assume user identities and potentially escalate privileges or disrupt services. Although no public exploits are currently known, the vulnerability's presence in a widely used WordPress plugin makes it a significant threat. No official patches have been linked yet, so mitigation requires careful monitoring and possibly temporary workarounds.

Potential Impact

The vulnerability allows unauthenticated attackers to bypass authentication and log in as newly registered users, potentially enabling unauthorized access to sensitive data and administrative functions depending on the privileges of the created user accounts. This can lead to data breaches, unauthorized content modification, and disruption of website availability. Organizations relying on this plugin for membership management, subscriptions, or content restriction face risks of account takeover and privilege escalation. The compromise of user accounts can also facilitate further attacks such as phishing, malware distribution, or lateral movement within the network. Given WordPress's widespread use, the vulnerability could affect a large number of websites globally, especially those that have not updated the plugin or implemented compensating controls. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once the vulnerability is public. The high CVSS score reflects the critical nature of the impact on confidentiality, integrity, and availability.

Mitigation Recommendations

1. Immediately update the wpeverest User Registration & Membership plugin to a patched version once available from the vendor. 2. Until a patch is released, disable the plugin or restrict access to the registration functionality to trusted IP addresses or authenticated users only. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the 'register_member' function or attempts to exploit the 'urm_user_just_created' user meta. 4. Monitor server and application logs for unusual login activity, especially logins of newly created users without corresponding registration events. 5. Enforce strong user registration policies, such as CAPTCHA challenges and email verification, to reduce automated or malicious registrations. 6. Conduct regular security audits and vulnerability scans on WordPress sites to detect outdated plugins and configuration weaknesses. 7. Educate site administrators about the risks and signs of exploitation related to this vulnerability. 8. Consider isolating critical WordPress instances or using containerization to limit the blast radius of potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-02T18:22:15.860Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a05b9eb7ef31ef0b68a5fa

Added to database: 2/26/2026, 2:41:34 PM

Last enriched: 2/26/2026, 2:55:49 PM

Last updated: 2/26/2026, 11:13:55 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses