{"id":326682,"date":"2026-03-03T13:12:07","date_gmt":"2026-03-03T13:12:07","guid":{"rendered":"https:\/\/www.newsbeep.com\/ie\/326682\/"},"modified":"2026-03-03T13:12:07","modified_gmt":"2026-03-03T13:12:07","slug":"wordpress-user-registration-membership-plugin-vulnerability","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/ie\/326682\/","title":{"rendered":"WordPress User Registration &#038; Membership Plugin Vulnerability"},"content":{"rendered":"<p>An advisory has been published about a critical vulnerability discovered in the User Registration &amp; Membership plugin for WordPress, installed on more than 60,000 websites. The vulnerability is rated 9.8\/10. It enables unauthenticated attackers to create administrator-level accounts.<\/p>\n<p>User Registration &amp; Membership WordPress Plugin<\/p>\n<p>The plugin is used to build membership websites. It allows site owners to create custom registration forms, assign user roles, restrict content behind subscription plans, and accept payments for access.<\/p>\n<p>Unauthenticated Privilege Escalation<\/p>\n<p>The issue affects all versions up to and including 5.1.2.<\/p>\n<p>The vulnerability is due to improper privilege management during membership registration. The plugin accepts a user-supplied role when someone registers but does not properly enforce a server-side allowlist of permitted roles.<\/p>\n<p>A server-side allowlist is a security control that limits which user roles can be assigned during registration. Without that restriction, the system processes whatever role value is submitted.<\/p>\n<p>Because this check is missing, an attacker can supply administrator as the role during registration.<\/p>\n<p>What Attackers Can Do<\/p>\n<p>This makes it possible for unauthenticated attackers to create administrator accounts.<\/p>\n<p>An administrator account has full control over a WordPress website. With administrator access, an attacker can:<\/p>\n<p>Install or delete plugins<br \/>\nModify themes<br \/>\nUpload malicious code<br \/>\nCreate or delete user accounts<br \/>\nAccess site data<br \/>\nCreating an administrator account effectively gives an attacker control of the site.<\/p>\n<p>According to the <a href=\"https:\/\/www.wordfence.com\/threat-intel\/vulnerabilities\/wordpress-plugins\/user-registration\/user-registration-membership-512-unauthenticated-privilege-escalation-via-membership-registration\" target=\"_blank\" rel=\"noopener nofollow\">Wordfence advisory<\/a>:<\/p>\n<p>\u201cThe User Registration &amp; Membership \u2013 Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction &amp; Membership Plugin plugin for WordPress is vulnerable to improper privilege management in all versions up to, and including, 5.1.2. This is due to the plugin accepting a user-supplied role during membership registration without properly enforcing a server-side allowlist. This makes it possible for unauthenticated attackers to create administrator accounts by supplying a role value during membership registration.\u201d<\/p>\n<p>Affected and Patched Versions<\/p>\n<p>The vulnerability affects all versions up to and including 5.1.2.<\/p>\n<p>It has been patched in version 5.1.3.<\/p>\n<p>The fix restricts which roles can be assigned during membership registration, preventing users from submitting elevated roles such as administrator.<\/p>\n<p>What Site Owners Should Do<\/p>\n<p>Users of the User Registration &amp; Membership plugin should update to version 5.1.3 or newer.\u00a0Because the vulnerability does not require authentication, sites that remain on vulnerable versions are exposed to administrator account creation by attackers. Updating the plugin removes the ability for users to assign privileged roles during registration.<\/p>\n<p>Featured Image by Shutterstock\/Kues<\/p>\n","protected":false},"excerpt":{"rendered":"An advisory has been published about a critical vulnerability discovered in the User Registration &amp; Membership plugin for&hellip;\n","protected":false},"author":2,"featured_media":326683,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[61,60,80],"class_list":{"0":"post-326682","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-ie","9":"tag-ireland","10":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts\/326682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/comments?post=326682"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts\/326682\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/media\/326683"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/media?parent=326682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/categories?post=326682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/tags?post=326682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}