CVE-2026-1994
Awaiting Analysis Awaiting Analysis - Queue
Privilege Escalation in s2Member Plugin via Password Update Flaw

Publication date: 2026-02-19

Last updated on: 2026-02-19

Assigner: Wordfence

Description
The s2Member plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 260127. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-19
Last Modified
2026-02-19
Generated
2026-05-07
AI Q&A
2026-02-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
websharks s2member to 260127 (inc)
websharks s2member From 260215 (inc)
s2member s2member to 260127 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The s2Member plugin for WordPress has a vulnerability that allows privilege escalation through account takeover. This happens because the plugin does not properly verify a user's identity before allowing a password update. As a result, an unauthenticated attacker can change the password of any user, including administrators, and then use that access to take over their account.


What immediate steps should I take to mitigate this vulnerability?

I don't know


How can this vulnerability impact me? :

This vulnerability can have severe impacts because it allows attackers to gain unauthorized access to user accounts, including those with administrative privileges. Attackers can change passwords without authentication, potentially leading to full control over the affected WordPress site, data breaches, and disruption of services.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart