Critical WordPress membership plugin vulnerability enables full site takeover

Tens of thousands of WordPress websites are exposed to a critical-severity vulnerability in the User Registration & Membership plugin, which is used to create subscription planscontrol user access, and accept payments. Security researchers at Defiant reported the issue, warning it can lead to full website takeover.

The core problem is simple but brutal: the plugin accepts user-supplied roles during membership registration without properly enforcing a server-side allowlist. That means an attacker can register and, during that process, supply a role value that effectively grants administrator-level privileges.

And because the registration flow can be reached without authentication, it turns into the kind of vulnerability attackers love—low friction, high impact.

How the bug works: user-supplied role accepted without a server-side allowlist

Improper privilege management in membership registration

Defiant described the flaw as “improper privilege management”. In practice, the plugin’s registration logic allows a user to provide a role value, but it doesn’t reliably constrain that value to a safe list on the server side.

So instead of being limited to a normal membership role, an unauthenticated attacker can submit a registration request that includes an elevated role and end up with an admin account.

Unauthenticated admin account creation is the worst-case scenario

When a vulnerability lets an attacker create an administrator account without logging in first, the usual “security issue” language doesn’t really capture what’s happening. Admin access is the keys to everything.

Once a malicious admin exists, the site isn’t “at risk.” It’s effectively owned.

CVE-2026-1492 details: severity, affected versions, and the fixed release

CVE tracking and critical score

The vulnerability is tracked as CVE-2026-1492 and carries a 9.8/10 severity score (critical).

Affected plugin versions

The flaw affects all versions up to and including 5.1.2.

Fixed version available

The issue is fixed in version 5.1.3, which is available for download.

Active exploitation signals: 200+ exploit attempts in 24 hours

Defiant researchers observed more than 200 attempts to exploit this vulnerability in just 24 hours. That kind of volume is a loud signal that attackers aren’t merely “testing” it—they’re actively hunting for exposed sites.

In other words: if your site is vulnerable and reachable, it’s reasonable to assume someone will try it.

How many WordPress sites are exposed: install base, older versions, and the 37,000 estimate

Plugin adoption expands the attack surface

According to the official WordPress repository, User Registration & Membership is installed on more than 60,000 active websites. That makes this a high-value target for attackers: one exploit path, tens of thousands of potential victims.

Older versions dominate current installations

The situation gets worse because the “vast majority” of installations—62.7%—are running versions 4.4 and older.

Estimated vulnerable sites

Based on the reported numbers, at least 37,000 websites are currently susceptible to this improper privilege management bug.

Version confusion may hide the true vulnerable count

One extra complication: the plugin page reportedly does not differentiate between versions 5.1.2 and 5.1.3. That makes it harder for site owners to quickly verify whether they’re on the fixed release, and it raises the possibility that the real number of vulnerable sites is even higher than the estimate.

What attackers can do with a WordPress admin account after exploitation

Once threat actors have an admin account, Defiant warned they can cause serious damage across multiple fronts:

Data exfiltration and access to sensitive information

With admin-level control, attackers can exfiltrate sensitive data from the site. If the site is handling memberships, subscriptions, or payments, the potential value of what’s accessible goes up fast.

Malware hosting and abuse of site reputation

Attackers can use the compromised website as a host for malware, turning a legitimate domain into infrastructure for broader campaigns.

Traffic redirection, ad abuse, and credential theft

Threat actors can redirect legitimate traffic to malicious websites “ridden with ads,” and they can also trick users into sharing login credentials. That’s the kind of downstream harm that doesn’t just hit the site owner—it hits visitors too.