CVE-2026-1779

8.1 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to bypass authentication in WordPress sites using the User Registration & Membership plugin. Attackers can log in as newly registered users who have the 'urm_user_just_created' meta flag set. All WordPress sites running vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • WordPress User Registration & Membership plugin
Versions: Up to and including 5.1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin enabled. The vulnerability triggers when new users are being registered.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to WordPress sites, allowing them to install backdoors, modify content, steal data, or take complete control of the website.

🟠

Likely Case

Attackers gain access to user accounts with varying privilege levels, potentially accessing sensitive user data, posting malicious content, or escalating privileges.

🟢

If Mitigated

With proper monitoring and limited user privileges, impact is reduced to unauthorized access to low-privilege accounts only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in the register_member function and requires the 'urm_user_just_created' user meta to be present, which occurs during user registration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.1.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/user-registration/tags/5.1.3/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'User Registration & Membership'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 5.1.3+ from WordPress.org and replace the plugin files.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate user-registration-membership

Block registration endpoints

all

Use web application firewall to block access to user registration endpoints

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access user registration functionality
  • Enable detailed logging of all user registration and authentication events for monitoring

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > User Registration & Membership > Version. If version is 5.1.2 or lower, you are vulnerable.

Check Version:

wp plugin get user-registration-membership --field=version

Verify Fix Applied:

After updating, verify plugin version shows 5.1.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login from same IP
  • User accounts logging in immediately after creation
  • Unusual user registration patterns

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action=register_member
  • Multiple registration attempts from single IP

SIEM Query:

source="wordpress.log" AND ("register_member" OR "urm_user_just_created")

🔗 References

📤 Share & Export