Paid Membership Subscriptions – Effortless Memberships, Recurring P…

Paid Membership Subscriptions – Effortless Memberships, Recurring P…

by | Feb 17, 2026 | Plugins

Attack Vectors

CVE-2025-68514 is a Medium severity vulnerability (CVSS 4.3) affecting the WordPress plugin Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction (slug: paid-member-subscriptions) in versions up to and including 2.16.8.

The issue is exploitable by an authenticated user with Subscriber-level access or higher. In practical terms, this means the threat does not require admin access or a compromised server first—any account with basic login privileges could potentially be used.

Because the vulnerability can be triggered over the network and does not require user interaction, it increases the likelihood of misuse in organizations where many users, partners, or customers have accounts (for example, membership sites, customer portals, or gated content experiences).

Security Weakness

This vulnerability is an Insecure Direct Object Reference (IDOR). It stems from missing validation on a user-controlled key, allowing an authenticated user to reference something they should not be permitted to access or act upon.

In business terms, the control intended to ensure “this user can only act on their own items” is not enforced strongly enough. As a result, a logged-in user could potentially carry out an unauthorized action by manipulating a parameter they can influence.

Technical or Business Impacts

While this vulnerability is rated Medium, it can still create meaningful risk for revenue, trust, and compliance—especially for membership and subscription businesses where accounts, entitlements, and access rules directly map to money and customer experience.

Potential business impacts may include unauthorized changes that affect account states or access permissions, disruptions to member experience, support escalations, and reputational damage if customers believe access controls are unreliable.

Governance and compliance teams should note that weaknesses in access control can be relevant to audits and internal control frameworks, particularly where subscription access is tied to contractual obligations, paid tiers, or regulated content.

Remediation: Update Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction to version 2.16.9 or newer. Track the issue under CVE-2025-68514 and reference the vendor advisory details from Wordfence for validation and stakeholder reporting.

Similar Attacks

IDOR and access-control mistakes are a common cause of “authorized user, unauthorized action” incidents across industries. Publicly documented examples include:

PortSwigger Academy: Insecure Direct Object References (IDOR) (educational examples showing how basic parameter changes can bypass intended access controls)

OWASP: Broken Access Control (high-level overview of real-world patterns and outcomes tied to access-control failures)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers