Membee Login Vulnerability (High) – CVE-2025-68844

Membee Login Vulnerability (High) – CVE-2025-68844

by | Feb 10, 2026 | Plugins

Attack Vectors

Membee Login (WordPress plugin slug: membees-member-login-widget) is affected by a High-severity vulnerability (CVSS 7.2) identified as CVE-2025-68844.

The issue is an unauthenticated stored cross-site scripting (XSS) flaw in versions up to and including 2.3.6. “Unauthenticated” matters from a business-risk perspective because it means an attacker may not need a user account to inject malicious content. “Stored” matters because the injected content can persist and run later when other people visit the affected page(s).

Practically, this can be used to place hostile scripts into content that executes automatically when a visitor views an injected page—potentially impacting customers, prospects, staff, and administrators depending on who visits and from where (e.g., public site pages vs. internal/admin workflows).

Security Weakness

According to the published advisory, the weakness stems from insufficient input sanitization and output escaping in Membee Login versions ≤ 2.3.6. In plain terms: the plugin does not consistently treat some user-controlled input as untrusted, allowing it to be saved and later displayed in a way that the browser interprets as active code.

This creates a scenario where content that should be handled as plain text is instead executed as script in a visitor’s browser session. Because it is a stored XSS vulnerability, the exposure is not limited to a single click or one-time interaction; it can affect every visitor who loads the injected page until the malicious content is removed and the vulnerability is patched.

Remediation: Update Membee Login to version 2.3.7 or a newer patched release as recommended by the advisory source.

Technical or Business Impacts

For executives and marketing leaders, the biggest concern is not “a script runs,” but what that enables: brand damage, customer trust erosion, and compliance exposure. A stored XSS issue can be used to change what visitors see, silently redirect traffic, or manipulate forms and calls-to-action—directly impacting revenue and campaign performance.

From a security and compliance standpoint, this can also increase risk of unauthorized actions taken in a user’s browser session (especially if staff or administrators visit affected pages), as well as potential exposure of limited sensitive information (CVSS indicates low confidentiality and integrity impact but a changed scope, meaning effects can extend beyond the initially affected component).

Similar attacks (real examples): Stored XSS has been repeatedly used in WordPress ecosystems to deface pages and inject malicious redirects. For context, see examples of WordPress plugin XSS issues such as CVE-2024-27956 and CVE-2023-2745.

If you use Membee Login, prioritize patching to 2.3.7+, then review high-traffic pages for unexpected content changes, unexplained redirects, and unusual form behavior. This helps protect conversion paths, reduce reputational risk, and demonstrate due diligence to compliance stakeholders.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers