CyberLeveling Logo
WordPress Plugin Vulnerability

CVE-2026-1492: Critical WordPress Plugin Vulnerability Allowing Admin Account Takeover

March 8, 2026

In early 2026, security researchers disclosed a serious vulnerability affecting a popular WordPress plugin used for user registration and membership management. The issue, tracked as CVE-2026-1492, allows attackers to create administrator accounts on vulnerable websites without authentication.

Because administrator privileges provide full control over a WordPress site, this flaw is considered critical and carries a CVSS score of 9.8.

Overview of the Vulnerability

The vulnerability affects the User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin, a tool designed to help WordPress site owners create custom registration forms, manage users, and restrict content based on membership roles.

According to the official record for CVE-2026-1492, all versions up to and including 5.1.2 are vulnerable.

Core Issue

The problem lies in improper privilege management during user registration.

Normally, when a user registers on a WordPress site, the system assigns a predefined role such as:

  • Subscriber
  • Customer
  • Member

These roles are usually enforced on the server side to prevent manipulation. However, in vulnerable versions of the plugin, the registration process accepts a role value directly from user input without verifying that the role is allowed.

Because of this missing validation, an attacker can manipulate the registration request and specify a higher-privileged role such as administrator.

How the Exploit Works

The attack does not require authentication and can be performed remotely. A simplified version of the attack process looks like this:

  1. The attacker locates a website running the vulnerable plugin.
  2. They submit a registration request to the site.
  3. Instead of allowing the server to assign a safe role, they include their own role value in the request.
  4. The plugin accepts the supplied role and creates the account.

Example of manipulated registration data:

username = attacker
email = attacker@example.com
role = administrator

Because the plugin does not enforce a server-side allowlist, the request is accepted and a new administrator account is created. Once logged in, the attacker gains full administrative access to the WordPress site.

Why This Vulnerability Is Critical

The vulnerability received a CVSS 3.1 score of 9.8 (Critical) from the security company Wordfence. The scoring vector is:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • AV:N (Network) – exploitable over the internet
  • AC:L (Low complexity) – easy to exploit
  • PR:N (No privileges required) – attacker does not need an account
  • UI:N (No user interaction) – no victim action needed
  • C:H / I:H / A:H – full impact on confidentiality, integrity, and availability

Potential Impact on Websites

If exploited successfully, attackers can gain complete control over the affected WordPress site. Possible consequences include:

  • Installing malicious plugins or backdoors
  • Defacing the website
  • Redirecting visitors to malicious pages
  • Injecting spam or phishing content
  • Stealing sensitive user or database information
  • Creating additional hidden administrator accounts

Affected Versions

  • Vulnerable: User Registration & Membership plugin versions ≤ 5.1.2
  • Patched: Version 5.1.3 and later

Website administrators using the plugin should update immediately to the latest version.

Mitigation and Security Recommendations

  1. Update the Plugin: Upgrade to version 5.1.3 or newer as soon as possible.
  2. Review Administrator Accounts: Check the list of WordPress administrators for any unfamiliar accounts.
  3. Monitor Registration Logs: Look for suspicious user registrations, especially accounts created with elevated privileges.
  4. Remove Unknown Users: Delete any accounts that were created without authorization.
  5. Use a Security Plugin: Tools like Wordfence can help detect suspicious activity.
  6. Apply the Principle of Least Privilege: Ensure users are assigned the lowest level of access required.