Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2356: CWE-284 Improper Access Control in wpeverest User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder

0
Medium
VulnerabilityCVE-2026-2356cvecve-2026-2356cwe-284
Published: Thu Feb 26 2026 (02/26/2026, 02:23:55 UTC)
Source: CVE Database V5
Vendor/Project: wpeverest
Product: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder

Description

The User Registration & Membership – Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.2 via the 'register_member' function, due to missing validation on the 'member_id' user controlled key. This makes it possible for unauthenticated attackers to delete arbitrary user accounts that newly registered on the site who has the 'urm_user_just_created' user meta set.

AI-Powered Analysis

AILast updated: 02/26/2026, 15:28:21 UTC

Technical Analysis

CVE-2026-2356 is an Insecure Direct Object Reference (IDOR) vulnerability classified under CWE-284 (Improper Access Control) found in the 'User Registration & Membership' WordPress plugin developed by wpeverest. This plugin provides custom registration forms, login forms, user profiles, and membership management features. The vulnerability exists in the 'register_member' function, where the 'member_id' parameter is user-controlled and lacks proper validation or authorization checks. Specifically, attackers can manipulate the 'member_id' to delete arbitrary user accounts that have the 'urm_user_just_created' user meta set, which typically marks newly registered users. Since the flaw does not require authentication or user interaction, it can be exploited remotely by unauthenticated attackers. The impact is limited to the integrity of user accounts, allowing unauthorized deletion but not affecting confidentiality or availability directly. The CVSS v3.1 base score is 5.3 (medium), reflecting the ease of exploitation (network vector, low complexity, no privileges, no user interaction) but limited impact scope (integrity only). No patches or fixes have been officially released at the time of publication, and no known exploits have been reported in the wild. This vulnerability highlights the importance of proper access control and validation in user management functions within WordPress plugins, especially those handling membership and registration workflows.

Potential Impact

The primary impact of CVE-2026-2356 is the unauthorized deletion of newly created user accounts on affected WordPress sites. This compromises the integrity of user data and can disrupt membership or subscription services by removing legitimate users without their consent. For organizations relying on this plugin for managing memberships, subscriptions, or content restriction, this could lead to loss of user trust, administrative overhead to restore accounts, and potential service disruption for affected users. While the vulnerability does not directly expose sensitive data or cause denial of service, the ability to delete accounts without authentication could be leveraged in targeted attacks to disrupt community platforms, membership sites, or subscription-based services. The lack of authentication requirement and ease of exploitation increase the risk of automated attacks or mass account deletions. Organizations with high volumes of new user registrations are particularly vulnerable, as attackers can repeatedly exploit the flaw to delete multiple accounts. Although no known exploits are currently reported, the public disclosure increases the likelihood of future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2026-2356, organizations should immediately audit their WordPress sites for the presence of the vulnerable 'User Registration & Membership' plugin by wpeverest. Until an official patch is released, consider the following specific actions: 1) Temporarily disable or deactivate the plugin to prevent exploitation if membership functionality is not critical. 2) Restrict access to the 'register_member' function or related endpoints via web application firewall (WAF) rules, blocking unauthenticated requests attempting to manipulate 'member_id' parameters. 3) Implement custom code or hooks to validate and authorize any user deletion requests, ensuring only authorized administrators can delete accounts. 4) Monitor logs for suspicious activity targeting user registration or deletion functions, focusing on requests with unusual 'member_id' values or originating from unknown IP addresses. 5) Educate site administrators about the vulnerability and encourage prompt updates once a patch is available. 6) Consider additional hardening measures such as rate limiting registration-related endpoints to reduce the risk of mass exploitation. 7) Backup user data regularly to enable recovery of deleted accounts if exploitation occurs. These targeted mitigations go beyond generic advice by focusing on controlling access to the vulnerable function and monitoring for exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-11T16:54:51.661Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a062b5b7ef31ef0b701612

Added to database: 2/26/2026, 3:11:49 PM

Last enriched: 2/26/2026, 3:28:21 PM

Last updated: 2/26/2026, 10:29:44 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses