WP-Members Membership Plugin Vulnerability (Medium) – CVE-2026-2363

WP-Members Membership Plugin Vulnerability (Medium) – CVE-2026-2363

by | Mar 3, 2026 | Plugins

Attack Vectors

WP-Members Membership Plugin (slug: wp-members) versions up to and including 3.5.5.1 contain a medium-severity SQL Injection vulnerability (CVE-2026-2363, CVSS 6.5) that can be exploited by an authenticated user with Contributor-level access or higher. This matters because many organizations grant Contributor access to internal teams, contractors, agencies, or guest authors to keep content workflows moving.

The issue is triggered through the [wpmem_user_membership_posts] shortcode when an attacker can influence the order_by attribute. If a Contributor (or higher) can place or modify content that includes this shortcode—such as in a post, page, or other content area that renders shortcodes—they may be able to manipulate database queries and pull sensitive information from the site’s database.

Security Weakness

CVE-2026-2363 is caused by insufficient escaping of a user-supplied parameter and a lack of proper query preparation in the plugin’s database call. In business terms, this means the plugin can accept certain input that should be treated as unsafe, and then uses it in a way that can expose database contents.

Because the attacker must be logged in with at least Contributor privileges, the risk increases in real-world environments where multiple users have access, where roles are assigned broadly for speed, or where third-party vendors are given accounts. This is a classic “trusted user” threat: the attacker doesn’t need to break in if they already have an entry-level role.

Technical or Business Impacts

The primary impact is confidentiality: attackers can potentially extract sensitive information from the WordPress database. Depending on what your site stores, that could include member-related data, internal content, or other business records kept in WordPress tables. Even when the website appears to function normally, data exposure can create long-tail risk.

For marketing leaders and executives, the business consequences can include reputational damage, customer trust loss, regulatory/compliance reporting obligations, and incident-response costs. If the compromised information includes personal data, your Compliance Department may need to evaluate notification requirements and contractual obligations with partners.

Recommended action: Update WP-Members Membership Plugin to version 3.5.6 or newer (patched). As a risk-reduction step, also review which users have Contributor access or above, and remove accounts that are no longer needed.

Similar Attacks

SQL injection has a long track record of being used to steal data from web applications. Well-known examples include the 2014 eBay breach (widely reported as involving SQL injection): The Guardian coverage.

Another prominent case is the 2015 TalkTalk incident, in which SQL injection was cited in reporting and legal outcomes: BBC report.

For reference on this specific WordPress vulnerability, see the CVE record and vendor write-up: CVE-2026-2363 and Wordfence advisory.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers