SUMO Memberships for WooCommerce Vulnerability (High) – CVE-2025-60222

SUMO Memberships for WooCommerce Vulnerability (High) – CVE-2025-60222

by | Feb 26, 2026 | Plugins

Attack Vectors

SUMO Memberships for WooCommerce (slug: sumomemberships) is affected by a High-severity vulnerability (CVE-2025-60222, CVSS 8.8; vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) that can allow authenticated attackers (Subscriber-level and above) to escalate privileges to an administrative level on WordPress sites running versions <= 7.8.0.

From a business-risk perspective, the most common “real world” path to exploitation is an attacker obtaining any low-level login first (for example, through stolen credentials, password reuse, or an account created via open registration), and then using this flaw to elevate access without needing additional user interaction.

Official references: CVE-2025-60222 record and the vulnerability disclosure source from Wordfence: Wordfence entry.

Security Weakness

This issue is a privilege escalation weakness in the SUMO Memberships for WooCommerce plugin, affecting all versions up to and including 7.8.0. In practical terms, it means a user who should only have limited capabilities (such as a Subscriber) may be able to obtain administrative-level access.

Because the prerequisite is only a basic authenticated account (not an existing admin), the risk is elevated for organizations that rely on membership, customer, affiliate, or partner logins, or that allow public account creation for eCommerce and marketing funnels.

Remediation: Update SUMO Memberships for WooCommerce to version 7.9.0 or a newer patched release. If you have change-control requirements, treat this as a priority security update due to the High severity and direct path to admin takeover.

Technical or Business Impacts

If exploited, this vulnerability can lead to full administrative compromise of the WordPress site. For business owners and marketing leaders, that translates into high-likelihood, high-impact outcomes such as unauthorized changes to website content, conversion funnels, pricing, coupons, checkout flows, and customer-facing messaging—often without immediate visibility.

Potential downstream impacts include customer data exposure, disruption of revenue-generating pages, malicious redirects that damage brand trust and SEO, unauthorized plugin/theme changes that introduce persistent backdoors, and operational downtime that affects campaigns, email capture, and eCommerce performance. For Compliance, an admin-level compromise may trigger incident response obligations depending on what personal data is accessible through the compromised environment.

Business response actions to consider: (1) patch to 7.9.0+ promptly; (2) review recent administrative user creation and role changes; (3) rotate WordPress admin passwords and enforce MFA where possible; (4) audit WooCommerce/WordPress logs for suspicious logins from Subscriber-level accounts; and (5) temporarily limit open registration or tighten approval workflows if your business model allows it.

Similar attacks: high-impact WordPress plugin vulnerabilities have also enabled attackers to take over sites through other mechanisms (for example, remote code execution in popular themes/builders). One well-documented example is CVE-2024-25600 (Bricks Builder), which was widely reported as enabling serious site compromise risk when unpatched.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers