CVE-2026-2356: CWE-284 Improper Access Control in wpeverest User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder
The User Registration & Membership – Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.2 via the 'register_member' function, due to missing validation on the 'member_id' user controlled key. This makes it possible for unauthenticated attackers to delete arbitrary user accounts that newly registered on the site who has the 'urm_user_just_created' user meta set.
AI Analysis
Technical Summary
CVE-2026-2356 is an Insecure Direct Object Reference (IDOR) vulnerability classified under CWE-284 (Improper Access Control) found in the 'User Registration & Membership' WordPress plugin developed by wpeverest. This plugin provides custom registration forms, login forms, user profiles, and membership management features. The vulnerability exists in the 'register_member' function, where the 'member_id' parameter is user-controlled and lacks proper validation or authorization checks. Specifically, attackers can manipulate the 'member_id' to delete arbitrary user accounts that have the 'urm_user_just_created' user meta set, which typically marks newly registered users. Since the flaw does not require authentication or user interaction, it can be exploited remotely by unauthenticated attackers. The impact is limited to the integrity of user accounts, allowing unauthorized deletion but not affecting confidentiality or availability directly. The CVSS v3.1 base score is 5.3 (medium), reflecting the ease of exploitation (network vector, low complexity, no privileges, no user interaction) but limited impact scope (integrity only). No patches or fixes have been officially released at the time of publication, and no known exploits have been reported in the wild. This vulnerability highlights the importance of proper access control and validation in user management functions within WordPress plugins, especially those handling membership and registration workflows.
Potential Impact
The primary impact of CVE-2026-2356 is the unauthorized deletion of newly created user accounts on affected WordPress sites. This compromises the integrity of user data and can disrupt membership or subscription services by removing legitimate users without their consent. For organizations relying on this plugin for managing memberships, subscriptions, or content restriction, this could lead to loss of user trust, administrative overhead to restore accounts, and potential service disruption for affected users. While the vulnerability does not directly expose sensitive data or cause denial of service, the ability to delete accounts without authentication could be leveraged in targeted attacks to disrupt community platforms, membership sites, or subscription-based services. The lack of authentication requirement and ease of exploitation increase the risk of automated attacks or mass account deletions. Organizations with high volumes of new user registrations are particularly vulnerable, as attackers can repeatedly exploit the flaw to delete multiple accounts. Although no known exploits are currently reported, the public disclosure increases the likelihood of future exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2026-2356, organizations should immediately audit their WordPress sites for the presence of the vulnerable 'User Registration & Membership' plugin by wpeverest. Until an official patch is released, consider the following specific actions: 1) Temporarily disable or deactivate the plugin to prevent exploitation if membership functionality is not critical. 2) Restrict access to the 'register_member' function or related endpoints via web application firewall (WAF) rules, blocking unauthenticated requests attempting to manipulate 'member_id' parameters. 3) Implement custom code or hooks to validate and authorize any user deletion requests, ensuring only authorized administrators can delete accounts. 4) Monitor logs for suspicious activity targeting user registration or deletion functions, focusing on requests with unusual 'member_id' values or originating from unknown IP addresses. 5) Educate site administrators about the vulnerability and encourage prompt updates once a patch is available. 6) Consider additional hardening measures such as rate limiting registration-related endpoints to reduce the risk of mass exploitation. 7) Backup user data regularly to enable recovery of deleted accounts if exploitation occurs. These targeted mitigations go beyond generic advice by focusing on controlling access to the vulnerable function and monitoring for exploitation attempts.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, Italy, Spain
CVE-2026-2356: CWE-284 Improper Access Control in wpeverest User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder
Description
The User Registration & Membership – Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.2 via the 'register_member' function, due to missing validation on the 'member_id' user controlled key. This makes it possible for unauthenticated attackers to delete arbitrary user accounts that newly registered on the site who has the 'urm_user_just_created' user meta set.
AI-Powered Analysis
Technical Analysis
CVE-2026-2356 is an Insecure Direct Object Reference (IDOR) vulnerability classified under CWE-284 (Improper Access Control) found in the 'User Registration & Membership' WordPress plugin developed by wpeverest. This plugin provides custom registration forms, login forms, user profiles, and membership management features. The vulnerability exists in the 'register_member' function, where the 'member_id' parameter is user-controlled and lacks proper validation or authorization checks. Specifically, attackers can manipulate the 'member_id' to delete arbitrary user accounts that have the 'urm_user_just_created' user meta set, which typically marks newly registered users. Since the flaw does not require authentication or user interaction, it can be exploited remotely by unauthenticated attackers. The impact is limited to the integrity of user accounts, allowing unauthorized deletion but not affecting confidentiality or availability directly. The CVSS v3.1 base score is 5.3 (medium), reflecting the ease of exploitation (network vector, low complexity, no privileges, no user interaction) but limited impact scope (integrity only). No patches or fixes have been officially released at the time of publication, and no known exploits have been reported in the wild. This vulnerability highlights the importance of proper access control and validation in user management functions within WordPress plugins, especially those handling membership and registration workflows.
Potential Impact
The primary impact of CVE-2026-2356 is the unauthorized deletion of newly created user accounts on affected WordPress sites. This compromises the integrity of user data and can disrupt membership or subscription services by removing legitimate users without their consent. For organizations relying on this plugin for managing memberships, subscriptions, or content restriction, this could lead to loss of user trust, administrative overhead to restore accounts, and potential service disruption for affected users. While the vulnerability does not directly expose sensitive data or cause denial of service, the ability to delete accounts without authentication could be leveraged in targeted attacks to disrupt community platforms, membership sites, or subscription-based services. The lack of authentication requirement and ease of exploitation increase the risk of automated attacks or mass account deletions. Organizations with high volumes of new user registrations are particularly vulnerable, as attackers can repeatedly exploit the flaw to delete multiple accounts. Although no known exploits are currently reported, the public disclosure increases the likelihood of future exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2026-2356, organizations should immediately audit their WordPress sites for the presence of the vulnerable 'User Registration & Membership' plugin by wpeverest. Until an official patch is released, consider the following specific actions: 1) Temporarily disable or deactivate the plugin to prevent exploitation if membership functionality is not critical. 2) Restrict access to the 'register_member' function or related endpoints via web application firewall (WAF) rules, blocking unauthenticated requests attempting to manipulate 'member_id' parameters. 3) Implement custom code or hooks to validate and authorize any user deletion requests, ensuring only authorized administrators can delete accounts. 4) Monitor logs for suspicious activity targeting user registration or deletion functions, focusing on requests with unusual 'member_id' values or originating from unknown IP addresses. 5) Educate site administrators about the vulnerability and encourage prompt updates once a patch is available. 6) Consider additional hardening measures such as rate limiting registration-related endpoints to reduce the risk of mass exploitation. 7) Backup user data regularly to enable recovery of deleted accounts if exploitation occurs. These targeted mitigations go beyond generic advice by focusing on controlling access to the vulnerable function and monitoring for exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-11T16:54:51.661Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a062b5b7ef31ef0b701612
Added to database: 2/26/2026, 3:11:49 PM
Last enriched: 2/26/2026, 3:28:21 PM
Last updated: 2/26/2026, 10:29:44 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-42056: n/a
MediumCVE-2024-3331: Vulnerability in Spotfire Spotfire Enterprise Runtime for R - Server Edition
MediumCVE-2024-32902: Denial of service in Google Android
HighCVE-2024-27218: Information disclosure in Google Android
MediumCVE-2026-3264: Execution After Redirect in go2ismail Free-CRM
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.