CVE-2026-4248
Received Received - Intake
Sensitive Information Exposure in Ultimate Member Plugin Enables Admin Takeover

Publication date: 2026-03-27

Last updated on: 2026-03-27

Assigner: Wordfence

Description
The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authenticated attackers, with Contributor-level access and above, to craft a malicious pending post that, when previewed by an Administrator, generates a password reset token for the Administrator and exfiltrates it to an attacker-controlled server, leading to full account takeover.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-03-27
Generated
2026-05-07
AI Q&A
2026-03-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ultimate_member ultimate_member to 2.11.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should update the Ultimate Member plugin for WordPress to a version later than 2.11.2 where the issue is fixed.

Additionally, restrict Contributor-level access and above from creating or previewing posts that contain the '[um_loggedin]' shortcode or the '{usermeta:password_reset_link}' template tag until the update is applied.

Monitor and audit user roles and permissions to limit the risk of malicious pending posts being created and previewed by administrators.


Can you explain this vulnerability to me?

The Ultimate Member plugin for WordPress has a vulnerability in all versions up to and including 2.11.2. This vulnerability arises because the '{usermeta:password_reset_link}' template tag is processed within post content via the '[um_loggedin]' shortcode. This processing generates a valid password reset token for the currently logged-in user viewing the page.

An authenticated attacker with Contributor-level access or higher can exploit this by creating a malicious pending post. When an Administrator previews this post, it generates a password reset token for the Administrator and sends it to an attacker-controlled server. This allows the attacker to take over the Administrator's account.


How can this vulnerability impact me? :

This vulnerability can lead to a full account takeover of Administrator accounts on a WordPress site using the Ultimate Member plugin. An attacker with Contributor-level access can craft a malicious post that, when previewed by an Administrator, exposes the Administrator's password reset token to the attacker.

With this token, the attacker can reset the Administrator's password and gain complete control over the site, potentially leading to unauthorized access, data theft, site defacement, or further exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows authenticated attackers with Contributor-level access to generate and exfiltrate password reset tokens of Administrator accounts, leading to full account takeover.

Such unauthorized access and potential compromise of administrator accounts can lead to exposure of sensitive personal data managed through the WordPress site.

Consequently, this poses a risk to compliance with data protection regulations like GDPR and HIPAA, which require safeguarding sensitive information and preventing unauthorized access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart