Paid Membership Plugin, Ecommerce, User Registration Form, Login Fo…

Paid Membership Plugin, Ecommerce, User Registration Form, Login Fo…

by | Apr 15, 2026 | Plugins

Attack Vectors

This Medium-severity vulnerability (CVSS 4.3) affects the WordPress plugin “Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress” (slug: wp-user-avatar) in versions up to and including 4.16.12. An attacker must be logged in with at least Subscriber access (or higher).

The practical entry point is your membership checkout flow. If your site allows self-registration (common for marketing funnels, gated content, and trial memberships), an attacker can create a low-privilege account and then submit a crafted checkout request that includes a change_plan_sub_id value to attempt to subscribe to an inactive membership plan.

Reference: CVE-2026-4949 and the vendor vulnerability write-up from Wordfence: Wordfence advisory.

Security Weakness

CVE-2026-4949 is a Missing Authorization issue. In ProfilePress, the process_checkout function does not properly enforce the “plan active” status check when a change_plan_sub_id parameter is provided.

In business terms: the application logic that should prevent customers from selecting or switching into inactive membership products can be bypassed by an authenticated user who manipulates the checkout request. This is not a full site takeover, but it is a breakdown in membership control and revenue rules.

Technical or Business Impacts

Revenue leakage and pricing control: Inactive plans are often disabled for a reason (retired pricing, grandfathered terms, paused campaigns). If attackers can subscribe anyway, you may unintentionally honor outdated or unapproved offerings.

Unauthorized access to restricted content or benefits: If inactive plans map to access rules (premium content, downloads, member-only webinars, partner assets, or community spaces), users could obtain benefits that were intentionally withdrawn.

Compliance and contractual risk: For organizations with regulated content, licensing restrictions, or partner agreements, allowing access through an inactive plan can create audit and policy issues—even if the vulnerability “only” changes plan eligibility.

Operational and reporting impacts: Subscriptions created on inactive plans can complicate marketing attribution, lifecycle messaging, and revenue reporting, and may increase customer support load when users request fulfillment of benefits tied to deprecated offerings.

Recommended remediation: Update ProfilePress to version 4.16.13 or newer (patched). As a short-term risk reduction, consider limiting open registration, reviewing who has Subscriber access, and monitoring checkout/subscription logs for unexpected plan changes until updates are applied.

Similar Attacks

Authorization gaps like this are a common theme across web platforms because they often sit in “business logic” (checkout, plan changes, role-based actions) rather than obvious malware behavior. A few real-world examples include:

CVE-2023-28121 (WooCommerce Payments) – unauthorized admin creation via improper authorization
CVE-2023-22515 (Atlassian Confluence) – improper authorization enabling unauthorized instance changes

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers