Membership Plugin – Restrict Content Vulnerability (Medium) – CVE-2…

Membership Plugin – Restrict Content Vulnerability (Medium) – CVE-2…

by | Feb 17, 2026 | Plugins

Attack Vectors

Membership Plugin – Restrict Content (slug: restrict-content) is affected by a Medium severity vulnerability (CVSS 4.4, CVE-2026-1304) in versions 3.2.18 and earlier. The issue is a Stored Cross-Site Scripting (XSS) weakness in multiple invoice settings fields.

In practical terms, an attacker would need to be an authenticated user with administrator-level access or higher. From there, they could place harmful script content into invoice configuration fields. Because it is “stored,” the script can run later whenever someone views the affected page or area that displays the injected content.

While this does not represent an “anyone on the internet” threat due to the high privilege requirement, it is still a serious scenario for organizations with multiple admins, shared admin accounts, outsourced site management, or plugin/theme vendors who have elevated access.

Security Weakness

The vulnerability exists because certain invoice settings fields do not apply sufficient input sanitization and output escaping. That combination can allow script content entered into the settings to be saved and later rendered in a browser as active code.

Stored XSS is especially important for leadership and compliance teams because it can turn routine administrative content (like invoice settings) into an ongoing, repeatable risk—triggering whenever staff members, finance teams, or administrators access the impacted pages.

Technical or Business Impacts

Business risk: If exploited, this issue can undermine trust, disrupt operations, and create compliance exposure. Malicious scripts can be used to interfere with what administrators see and do in the WordPress dashboard and related pages.

Operational impact: Admin-level pages are where critical decisions are made—content changes, member access, billing configuration, and integrations. A stored script executing in an admin context can lead to unauthorized actions, altered settings, or data exposure, depending on what the injected script is designed to do.

Governance and compliance impact: Even though the attacker requires administrator privileges, many organizations treat admin access as a shared operational function (internal teams, agencies, contractors). This vulnerability raises the stakes of access control, account hygiene, and auditability—key concerns for compliance departments and executives.

Remediation: Update Membership Plugin – Restrict Content to version 3.2.19 or newer patched versions. Confirm the plugin version across all WordPress environments (production, staging, and any regional sites) and ensure administrative access is restricted to only those who truly need it.

Similar attacks (real examples): Stored XSS has been used across many web platforms to hijack sessions and perform unauthorized actions. Examples include CISA’s Known Exploited Vulnerabilities (KEV) Catalog documenting real-world exploitation activity across common software categories, WordPress 4.7.1 security release notes (historical web security issues affecting site integrity), and OWASP’s XSS overview describing how XSS is commonly leveraged to impact users and organizations.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers