Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification
The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.
The Paid Memberships Pro plugin, a popular WordPress plugin for managing paid subscriptions, contains a vulnerability (CVE-2026-4100) that allows authenticated attackers with minimal privileges (Subscriber-level access) to manipulate Stripe webhook configurations. This flaw exists in versions up to and including 3.6.5 due to missing capability checks on specific AJAX handlers. An attacker exploiting this vulnerability can delete, create, or rebuild the site’s Stripe webhook, leading to significant disruptions in payment processing, subscription renewal synchronization, cancellation handling, and management of failed payments. This vulnerability puts revenue streams and customer relationships at risk for any organization using the affected plugin versions.
Attack Chain
- An attacker gains Subscriber-level access to the WordPress site, either through registration or compromised credentials.
- The attacker crafts a malicious AJAX request targeting the
wp_ajax_pmpro_stripe_create_webhookendpoint. - Alternatively, the attacker crafts a malicious AJAX request to the
wp_ajax_pmpro_stripe_delete_webhookendpoint. - Or, the attacker crafts a malicious AJAX request to the
wp_ajax_pmpro_stripe_rebuild_webhookendpoint. - Due to missing capability checks, the server processes the request without proper authorization.
- The Stripe webhook configuration is modified, deleted, or rebuilt based on the attacker’s request.
- Legitimate payment processing and subscription management processes fail due to the altered webhook configuration.
- The attacker effectively disrupts the site’s ability to collect payments and manage subscriptions.
Impact
Successful exploitation of this vulnerability allows an attacker to completely disrupt a WordPress site’s payment processing and subscription management functionalities. This can result in significant financial losses due to interrupted sales and subscription renewals. Furthermore, the disruption can damage customer trust and lead to churn as users experience issues with their subscriptions. The vulnerability affects all sites using Paid Memberships Pro plugin versions up to 3.6.5.
Recommendation
- Immediately update the Paid Memberships Pro plugin to the latest version to patch CVE-2026-4100.
- Monitor WordPress web server logs for POST requests to
/wp-admin/admin-ajax.phpwith theactionparameter set topmpro_stripe_create_webhook,pmpro_stripe_delete_webhook, orpmpro_stripe_rebuild_webhookusing the “Detect Suspicious PMPro Stripe Webhook AJAX Requests” Sigma rule. - Review user roles and permissions to minimize the number of users with Subscriber-level access as a temporary mitigation.
Detection coverage 2
Detect Suspicious PMPro Stripe Webhook AJAX Requests
highDetects suspicious AJAX requests to modify Stripe webhooks in Paid Memberships Pro, indicating potential exploitation of CVE-2026-4100.
Detect PMPro Stripe Webhook AJAX Requests from Non-Admin IPs
mediumDetects AJAX requests to modify Stripe webhooks in Paid Memberships Pro originating from IP addresses not associated with administrative users, indicating potential unauthorized activity.
Detection queries are kept inside the platform. Get full rules →