Simple Membership WP user Import Vulnerability (Medium) – CVE-2026-…

Simple Membership WP user Import Vulnerability (Medium) – CVE-2026-…

by | Feb 10, 2026 | Plugins

Attack Vectors

The Simple Membership WP user Import plugin (slug: simple-membership-wp-user-import) is affected by a medium-severity Cross-Site Request Forgery (CSRF) issue in versions up to and including 1.9.1 (CVE-2026-24986).

This type of attack typically relies on social engineering: an unauthenticated attacker persuades a site administrator to click a link or visit a page while logged into WordPress. If successful, the attacker can cause an action to run in the admin’s browser without the admin intending it.

Security Weakness

According to the published advisory, the vulnerability is caused by missing or incorrect nonce validation on a function. Nonces are a common WordPress control used to confirm that sensitive requests are intentional and originate from the legitimate admin interface.

Without proper validation, a request that “looks like” an admin action can be accepted even when it was initiated by a third party, as long as the administrator is tricked into interacting with attacker-controlled content.

Technical or Business Impacts

While the CVSS details indicate low integrity impact (CVSS 4.3; CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N), CSRF risks are still meaningful for leadership because they can undermine administrative control and operational trust in the site’s back office.

For marketing and executive stakeholders, the most common business concerns include: unapproved changes that disrupt campaigns, unexpected user/account or site management actions performed under an admin’s authority, internal time spent on investigation and rollback, and potential compliance complications if administrative actions affect regulated workflows.

Recommended remediation is straightforward: update to version 1.9.2 or newer, which is identified as the patched release.

Reference: CVE-2026-24986 and the source advisory from Wordfence.

Similar Attacks

CSRF is a well-known web application risk pattern and is broadly documented as a recurring issue when request-validation protections are missing or misapplied. For additional context and examples of how CSRF-style attacks work in practice, see OWASP: Cross-Site Request Forgery (CSRF).

This specific case is tracked as CVE-2026-24986, affecting Simple Membership WP user Import versions <= 1.9.1, with a fix available in 1.9.2+.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers