Wishlist Member Vulnerability (High) – CVE-2024-37106

Wishlist Member Vulnerability (High) – CVE-2024-37106

by | Feb 26, 2026 | Plugins

Attack Vectors

WishList Member X (WordPress plugin slug: wishlist-member-x) is affected by CVE-2024-37106, rated High severity (CVSS 7.2, vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N). In versions prior to 3.26.7, an attacker can reach vulnerable functionality over the network and, without needing a logged-in account, exploit a missing authorization check to modify plugin settings.

Because the weakness can be used to inject stored cross-site scripting (stored XSS) into settings, the attacker’s script can persist and execute later when someone (often an administrator, marketer, or site manager) loads an affected page in the WordPress admin or other relevant interface.

Security Weakness

The core issue is a missing capability check (authorization) in a plugin function, impacting all versions up to but excluding 3.26.7. This means the plugin does not reliably confirm that a request is coming from a user who should be allowed to change those settings.

As a result, unauthenticated attackers can potentially update plugin configuration and inject malicious script content, leading to stored XSS behavior. Reference: CVE-2024-37106. Primary source: Wordfence vulnerability record.

Technical or Business Impacts

Brand and customer trust risk: Stored XSS can be used to display unauthorized content, redirect visitors, or present convincing phishing prompts. Even limited defacement or malicious popups can immediately impact campaign performance, lead generation, and brand credibility.

Account takeover and operational disruption risk: If malicious scripts execute in an administrative context, they may be used to interfere with site administration workflows, alter settings, or attempt to access sensitive data available to logged-in users. This can lead to extended incident response time, emergency site changes, and downtime during critical marketing periods.

Compliance and data-handling risk: Depending on what site data is accessible through the affected surfaces, unauthorized scripting can contribute to exposure of information (the CVSS indicates confidentiality and integrity impact). This can trigger internal reporting requirements and contractual or regulatory obligations.

Recommended remediation: Update WishList Member X to version 3.26.7 or newer (patched). After updating, review plugin settings for unexpected changes and consider rotating administrative credentials as part of standard incident hygiene if you suspect exploitation.

Similar Attacks

Stored XSS and authorization gaps in WordPress ecosystems are commonly leveraged to inject persistent scripts and compromise administrative sessions. Examples of well-known XSS incidents and research include:

Cloudflare: Protecting against XSS with Content Security Policy (CSP)
OWASP: Cross Site Scripting (XSS)
Acunetix: Cross-Site Scripting (XSS)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers