Wishlist Member Vulnerability (Medium) – CVE-2024-37111

Wishlist Member Vulnerability (Medium) – CVE-2024-37111

by | Feb 25, 2026 | Plugins

Attack Vectors

WishList Member X (WordPress plugin slug: wishlist-member-x) is affected by CVE-2024-37111, a Medium severity issue (CVSS 5.3, vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) impacting all versions prior to 3.26.7.

The risk is primarily exposure to unauthenticated denial of service: an attacker does not need an account or user interaction to attempt to disrupt availability. Because the issue is network-accessible and requires no privileges, it can be triggered remotely and repeatedly, increasing the likelihood of intermittent slowdowns or temporary loss of access for legitimate visitors.

Security Weakness

This vulnerability is categorized as a denial of service (DoS) weakness in WishList Member X versions up to, but not including, 3.26.7. The practical outcome is that attackers can send requests designed to limit access to the site, reducing availability for customers, members, and staff.

While this issue does not indicate data theft or content tampering (the published CVSS indicates no confidentiality or integrity impact), availability is a core part of security and business continuity—especially for membership sites, course portals, and checkout experiences where uptime directly affects revenue.

Technical or Business Impacts

For marketing directors and executives, the most relevant outcome is site availability risk. If a membership site becomes slow or unreachable, it can immediately impact campaign performance, paid media efficiency, lead capture, and customer satisfaction—often without clear warning.

Potential business impacts include:

Lost revenue and conversions: downtime during launches, promotions, or renewals can directly reduce sign-ups and increase cart abandonment.

Brand and trust damage: members who can’t access paid content or account areas are more likely to churn, submit chargebacks, or leave negative reviews.

Operational disruption: support teams see ticket spikes; engineering/IT spends time triaging performance issues rather than delivering roadmap work.

Compliance and reporting pressure: availability incidents may trigger internal incident-management processes, vendor risk reviews, or customer contractual obligations depending on your environment.

Remediation: update WishList Member X to version 3.26.7 or a newer patched release. Reference: CVE-2024-37111 and the source advisory at Wordfence Threat Intel.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers