
CVE-2026-1492: Critical WordPress Plugin Vulnerability Allowing Admin Account Takeover
March 8, 2026
In early 2026, security researchers disclosed a serious vulnerability affecting a popular WordPress plugin used for user registration and membership management. The issue, tracked as CVE-2026-1492, allows attackers to create administrator accounts on vulnerable websites without authentication.
Because administrator privileges provide full control over a WordPress site, this flaw is considered critical and carries a CVSS score of 9.8.
Overview of the Vulnerability
The vulnerability affects the User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin, a tool designed to help WordPress site owners create custom registration forms, manage users, and restrict content based on membership roles.
According to the official record for CVE-2026-1492, all versions up to and including 5.1.2 are vulnerable.
Core Issue
The problem lies in improper privilege management during user registration.
Normally, when a user registers on a WordPress site, the system assigns a predefined role such as:
- Subscriber
- Customer
- Member
These roles are usually enforced on the server side to prevent manipulation. However, in vulnerable versions of the plugin, the registration process accepts a role value directly from user input without verifying that the role is allowed.
Because of this missing validation, an attacker can manipulate the registration request and specify a higher-privileged role such as administrator.
How the Exploit Works
The attack does not require authentication and can be performed remotely. A simplified version of the attack process looks like this:
- The attacker locates a website running the vulnerable plugin.
- They submit a registration request to the site.
- Instead of allowing the server to assign a safe role, they include their own role value in the request.
- The plugin accepts the supplied role and creates the account.
Example of manipulated registration data:
username = attacker
email = attacker@example.com
role = administrator
Because the plugin does not enforce a server-side allowlist, the request is accepted and a new administrator account is created. Once logged in, the attacker gains full administrative access to the WordPress site.
Why This Vulnerability Is Critical
The vulnerability received a CVSS 3.1 score of 9.8 (Critical) from the security company Wordfence. The scoring vector is:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- AV:N (Network) – exploitable over the internet
- AC:L (Low complexity) – easy to exploit
- PR:N (No privileges required) – attacker does not need an account
- UI:N (No user interaction) – no victim action needed
- C:H / I:H / A:H – full impact on confidentiality, integrity, and availability
Potential Impact on Websites
If exploited successfully, attackers can gain complete control over the affected WordPress site. Possible consequences include:
- Installing malicious plugins or backdoors
- Defacing the website
- Redirecting visitors to malicious pages
- Injecting spam or phishing content
- Stealing sensitive user or database information
- Creating additional hidden administrator accounts
Affected Versions
- Vulnerable: User Registration & Membership plugin versions ≤ 5.1.2
- Patched: Version 5.1.3 and later
Website administrators using the plugin should update immediately to the latest version.
Mitigation and Security Recommendations
- Update the Plugin: Upgrade to version 5.1.3 or newer as soon as possible.
- Review Administrator Accounts: Check the list of WordPress administrators for any unfamiliar accounts.
- Monitor Registration Logs: Look for suspicious user registrations, especially accounts created with elevated privileges.
- Remove Unknown Users: Delete any accounts that were created without authorization.
- Use a Security Plugin: Tools like Wordfence can help detect suspicious activity.
- Apply the Principle of Least Privilege: Ensure users are assigned the lowest level of access required.
