Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4056: CWE-862 Missing Authorization in wpeverest User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder

0
Medium
VulnerabilityCVE-2026-4056cvecve-2026-4056cwe-862
Published: Mon Mar 23 2026 (03/23/2026, 23:25:49 UTC)
Source: CVE Database V5
Vendor/Project: wpeverest
Product: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder

Description

CVE-2026-4056 is a medium severity vulnerability in the wpeverest User Registration & Membership WordPress plugin versions 5. 0. 1 through 5. 1. 4. The flaw arises from insufficient authorization checks on Content Access Rules REST API endpoints, where the plugin only verifies the 'edit_posts' capability instead of requiring administrator-level permissions. This allows authenticated users with Contributor-level access or higher to manipulate content restriction rules site-wide, including listing, creating, modifying, toggling, duplicating, and deleting these rules. Exploitation could lead to unauthorized exposure of restricted content or denial of legitimate user access. No user interaction is required beyond authentication, and no known exploits are currently reported in the wild. The CVSS 3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:04:51 UTC

Technical Analysis

The vulnerability identified as CVE-2026-4056 affects the wpeverest User Registration & Membership plugin for WordPress, specifically versions 5.0.1 through 5.1.4. The root cause is a missing proper authorization check in the Content Access Rules REST API endpoints. Instead of verifying administrator-level capabilities, the plugin only checks for the 'edit_posts' capability, which is granted to users with Contributor-level access and above. This insufficient permission validation allows authenticated users with lower privileges to perform unauthorized actions on content restriction rules. These actions include listing all rules, creating new rules, modifying existing ones, toggling their active status, duplicating, and deleting them. Such unauthorized modifications can lead to exposure of content that should be restricted or prevent legitimate users from accessing content they are entitled to. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based (remote). The CVSS 3.1 score of 5.4 reflects a medium severity, with impacts on confidentiality and integrity but no direct impact on availability. No public exploits are known at this time, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially those relying on content restriction for paid memberships or sensitive content. The issue stems from CWE-862: Missing Authorization, highlighting the importance of strict capability checks in REST API endpoints. As the plugin is widely used for membership and subscription management, the scope of affected systems is broad, potentially impacting many WordPress installations globally.

Potential Impact

The primary impact of CVE-2026-4056 is unauthorized modification of content restriction rules within affected WordPress sites. This can lead to several adverse outcomes: exposure of restricted or paid content to unauthorized users, undermining business models based on subscriptions or memberships; denial of access to legitimate users by maliciously altering or deleting access rules, potentially causing customer dissatisfaction and loss of revenue; and potential reputational damage if sensitive or proprietary content is leaked. Since the vulnerability allows privilege escalation from Contributor-level users to effectively administrator-level control over content restrictions, insider threats or compromised lower-privilege accounts pose a significant risk. The integrity of content access policies is compromised, and confidentiality is at risk. However, the vulnerability does not directly affect system availability or cause denial-of-service conditions. Organizations relying on this plugin for content gating, membership management, or subscription services are particularly vulnerable. The medium severity rating suggests that while the vulnerability is serious, exploitation requires authenticated access, limiting the attack surface somewhat. Nonetheless, given the widespread use of WordPress and this plugin, the potential impact on organizations worldwide is considerable.

Mitigation Recommendations

To mitigate CVE-2026-4056, organizations should immediately update the wpeverest User Registration & Membership plugin to a version where this vulnerability is patched once available. In the absence of an official patch, administrators should implement strict role and capability management, ensuring that only trusted users have Contributor-level or higher access. Review and restrict user roles to the minimum necessary privileges to reduce the risk of exploitation. Additionally, consider implementing Web Application Firewall (WAF) rules to monitor and block suspicious REST API calls targeting content access rules endpoints. Audit existing content restriction rules for unauthorized changes and monitor logs for unusual activity related to REST API usage. Employ multi-factor authentication (MFA) for all authenticated users to reduce the risk of compromised accounts. Finally, maintain regular backups of configuration and content restriction settings to enable rapid recovery if unauthorized modifications occur. Plugin developers should revise the authorization checks in the REST API endpoints to require administrator-level capabilities rather than 'edit_posts' to prevent similar issues in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-03-12T16:26:32.690Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c1d4a7f4197a8e3ba0b3fd

Added to database: 3/24/2026, 12:02:47 AM

Last enriched: 3/24/2026, 12:04:51 AM

Last updated: 3/24/2026, 5:07:39 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses