Wishlist Member Vulnerability (Medium) – CVE-2024-37113

Wishlist Member Vulnerability (Medium) – CVE-2024-37113

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2024-37113 is a Medium-severity information exposure issue (CVSS 5.3) affecting WishList Member X (WordPress plugin slug: wishlist-member-x) in all versions prior to 3.26.7.

The primary attack path is straightforward: an unauthenticated attacker (no login required) can attempt to access and download a site’s database backup due to the plugin’s exposure weakness. Because no user interaction is required, this type of issue can be probed at scale by opportunistic attackers scanning the internet.

Reference: CVE-2024-37113 record.

Security Weakness

The vulnerability is categorized as Sensitive Information Exposure. According to the published advisory, WishList Member X versions up to (but not including) 3.26.7 have a weakness that can allow unauthorized downloads of the site’s database backup.

Business-wise, the key issue is not “a bug in a plugin,” but the outcome: if a database backup is accessible to the public, it can expose whatever your database contains (customer records, member data, admin emails, password hashes, order history, API keys stored in options tables, and other operational details).

Source: Wordfence vulnerability advisory.

Technical or Business Impacts

If attackers successfully obtain a database backup, the impact can extend well beyond the website. Potential outcomes include:

Customer/member data exposure: personal information stored in WordPress and membership records may be disclosed, triggering privacy and contractual obligations.

Account takeover risk: exposed password hashes can be targeted offline; exposed reset tokens, keys, or operational secrets can accelerate follow-on compromise.

Regulatory and compliance impact: depending on what data is in the database, this may create breach notification requirements and compliance exposure (privacy laws, contractual security clauses, industry frameworks).

Brand and revenue damage: membership platforms and marketing sites rely heavily on trust. Data exposure often results in churn, lower conversion rates, increased support load, and reputational harm.

Remediation: update WishList Member X to version 3.26.7 or newer (patched). After updating, treat this as a potential exposure event: review logs for suspicious download activity, rotate credentials/secrets that may be stored or referenced by the site, and consider requiring password resets if risk warrants.

Similar Attacks

Information exposure incidents often follow the same pattern: sensitive datasets (including backups) are inadvertently made accessible and then harvested for fraud, extortion, or downstream compromise. A few widely reported examples include:

Verizon (via third-party exposure) data incident — an example of how mismanaged access to stored data can lead to large-scale exposure.

Accenture cloud storage exposure reports — highlights how improperly secured stored data can be discovered and accessed.

Deep Root Analytics voter data exposure — a case demonstrating the reputational and regulatory fallout when large datasets become publicly accessible.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers