Home

Description

The WishList Member plugin for WordPress is vulnerable to Privilege Escalation via Missing Authorization in versions up to and including 3.30.1. This is due to the missing capability and nonce check in the ajax_get_screen() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to supply an arbitrary admin screen identifier via the data[url] parameter, causing the plugin to load and execute the administrative API configuration template without authorization. The rendered HTML, which contains the plugin's plaintext REST API Secret Key, is returned directly to the attacker in the AJAX JSON response. An attacker who obtains this key can authenticate to the WishList Member API, create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.

PUBLISHED Reserved 2026-04-16 | Published 2026-05-23 | Updated 2026-05-23 | Assigner Wordfence




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-269 Improper Privilege Management

Product status

Default status
unaffected

Any version
affected

Timeline

2026-05-20:Vendor Notified
2026-05-22:Disclosed

Credits

Phú finder

References

www.wordfence.com/...-0878-4e9e-8082-e0f6effef92c?source=cve

wishlistmember.com/

cve.org (CVE-2026-6419)

nvd.nist.gov (CVE-2026-6419)

Download JSON